Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe
Resource
win10v2004-20240729-en
General
-
Target
4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe
-
Size
322KB
-
MD5
61c5a8e414a47b8cc2c69e1ac4370a35
-
SHA1
d6d66b31e7ebe3bd032a33fbe35fed2720fae964
-
SHA256
4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b
-
SHA512
b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92
-
SSDEEP
6144:l5B8DY9c80tk5koaMrtonT8nzkwHgDKFaz4cHgo2TW:rB8DY9yYhaODRgDKiHgo2a
Malware Config
Extracted
redline
diamotrix
176.111.174.140:1912
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6082381502:AAFgFkge53k6kBZcTN8CBICiZV-VphQ1WgA/sendMessage?chat_id=5795480469
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
PWhSiRkcxVoa
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016d6e-79.dat family_redline behavioral1/memory/772-80-0x00000000003F0000-0x0000000000442000-memory.dmp family_redline -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/memory/2764-204-0x0000000001380000-0x00000000013B2000-memory.dmp family_stormkitty behavioral1/files/0x00060000000193da-203.dat family_stormkitty -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x00060000000193da-203.dat family_asyncrat behavioral1/files/0x0006000000019650-343.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts relog.exe -
Executes dropped EXE 11 IoCs
pid Process 772 6519.tmp.uIZtAux.exe 768 6836.tmp.svchost.exe 1352 7985.tmp.zbi.exe 572 servisis.exe 3056 2407.tmp.sahyu.exe 2732 test.exe 2764 3354.tmp.PwHnaA.exe 1744 5843.tmp.PPGcgnyW.exe 2760 svchost.exe 2612 servisis.exe 2032 servisis.exe -
Loads dropped DLL 6 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 3056 2407.tmp.sahyu.exe 2732 test.exe 2724 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/768-86-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/files/0x0007000000016da7-85.dat upx behavioral1/memory/572-102-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/572-104-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/768-105-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2612-361-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2612-363-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2032-401-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2032-403-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_{2864474C38203701991499} = "C:\\Users\\Admin\\AppData\\Roaming\\{2864474C38203701991499}\\Service_{2864474C38203701991499}.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{2864474C38203701991499}\\{2864474C38203701991499}.exe" 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Service_Adobe.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Identities = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Service_Identities.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Macromedia = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Service_Macromedia.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Media Center Programs = "C:\\Users\\Admin\\AppData\\Roaming\\Media Center Programs\\Service_Media Center Programs.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Service_Microsoft.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Service_Mozilla.exe" relog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 3354.tmp.PwHnaA.exe File opened for modification C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 3354.tmp.PwHnaA.exe File created C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 3354.tmp.PwHnaA.exe File created C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 3354.tmp.PwHnaA.exe File created C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 3354.tmp.PwHnaA.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2480 set thread context of 2796 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6519.tmp.uIZtAux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3354.tmp.PwHnaA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6836.tmp.svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5843.tmp.PPGcgnyW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1360 cmd.exe 1752 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 3354.tmp.PwHnaA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 3354.tmp.PwHnaA.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2896 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe 1156 schtasks.exe 2036 schtasks.exe 2784 schtasks.exe 592 schtasks.exe 2792 schtasks.exe 2784 schtasks.exe 2592 schtasks.exe 2716 schtasks.exe 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 1208 Explorer.EXE 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe 2796 relog.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeSecurityPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeTakeOwnershipPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeLoadDriverPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeSystemProfilePrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeSystemtimePrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeProfSingleProcessPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeIncBasePriorityPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeCreatePagefilePrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeBackupPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeRestorePrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeShutdownPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeDebugPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeSystemEnvironmentPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeRemoteShutdownPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeUndockPrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeManageVolumePrivilege 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: 33 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: 34 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: 35 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe Token: SeDebugPrivilege 2796 relog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2792 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 30 PID 2480 wrote to memory of 2792 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 30 PID 2480 wrote to memory of 2792 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 30 PID 2480 wrote to memory of 2796 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 32 PID 2480 wrote to memory of 2796 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 32 PID 2480 wrote to memory of 2796 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 32 PID 2480 wrote to memory of 2796 2480 4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe 32 PID 2796 wrote to memory of 2784 2796 relog.exe 33 PID 2796 wrote to memory of 2784 2796 relog.exe 33 PID 2796 wrote to memory of 2784 2796 relog.exe 33 PID 2796 wrote to memory of 2760 2796 relog.exe 35 PID 2796 wrote to memory of 2760 2796 relog.exe 35 PID 2796 wrote to memory of 2760 2796 relog.exe 35 PID 2796 wrote to memory of 2592 2796 relog.exe 37 PID 2796 wrote to memory of 2592 2796 relog.exe 37 PID 2796 wrote to memory of 2592 2796 relog.exe 37 PID 2796 wrote to memory of 2716 2796 relog.exe 39 PID 2796 wrote to memory of 2716 2796 relog.exe 39 PID 2796 wrote to memory of 2716 2796 relog.exe 39 PID 2796 wrote to memory of 2228 2796 relog.exe 41 PID 2796 wrote to memory of 2228 2796 relog.exe 41 PID 2796 wrote to memory of 2228 2796 relog.exe 41 PID 2796 wrote to memory of 592 2796 relog.exe 43 PID 2796 wrote to memory of 592 2796 relog.exe 43 PID 2796 wrote to memory of 592 2796 relog.exe 43 PID 2796 wrote to memory of 1156 2796 relog.exe 45 PID 2796 wrote to memory of 1156 2796 relog.exe 45 PID 2796 wrote to memory of 1156 2796 relog.exe 45 PID 2796 wrote to memory of 1208 2796 relog.exe 21 PID 2796 wrote to memory of 1208 2796 relog.exe 21 PID 1208 wrote to memory of 772 1208 Explorer.EXE 48 PID 1208 wrote to memory of 772 1208 Explorer.EXE 48 PID 1208 wrote to memory of 772 1208 Explorer.EXE 48 PID 1208 wrote to memory of 772 1208 Explorer.EXE 48 PID 1208 wrote to memory of 768 1208 Explorer.EXE 49 PID 1208 wrote to memory of 768 1208 Explorer.EXE 49 PID 1208 wrote to memory of 768 1208 Explorer.EXE 49 PID 1208 wrote to memory of 768 1208 Explorer.EXE 49 PID 768 wrote to memory of 2036 768 6836.tmp.svchost.exe 50 PID 768 wrote to memory of 2036 768 6836.tmp.svchost.exe 50 PID 768 wrote to memory of 2036 768 6836.tmp.svchost.exe 50 PID 768 wrote to memory of 2036 768 6836.tmp.svchost.exe 50 PID 1208 wrote to memory of 1352 1208 Explorer.EXE 52 PID 1208 wrote to memory of 1352 1208 Explorer.EXE 52 PID 1208 wrote to memory of 1352 1208 Explorer.EXE 52 PID 2008 wrote to memory of 572 2008 taskeng.exe 55 PID 2008 wrote to memory of 572 2008 taskeng.exe 55 PID 2008 wrote to memory of 572 2008 taskeng.exe 55 PID 2008 wrote to memory of 572 2008 taskeng.exe 55 PID 1208 wrote to memory of 3056 1208 Explorer.EXE 57 PID 1208 wrote to memory of 3056 1208 Explorer.EXE 57 PID 1208 wrote to memory of 3056 1208 Explorer.EXE 57 PID 3056 wrote to memory of 2732 3056 2407.tmp.sahyu.exe 58 PID 3056 wrote to memory of 2732 3056 2407.tmp.sahyu.exe 58 PID 3056 wrote to memory of 2732 3056 2407.tmp.sahyu.exe 58 PID 1208 wrote to memory of 2764 1208 Explorer.EXE 59 PID 1208 wrote to memory of 2764 1208 Explorer.EXE 59 PID 1208 wrote to memory of 2764 1208 Explorer.EXE 59 PID 1208 wrote to memory of 2764 1208 Explorer.EXE 59 PID 2764 wrote to memory of 1360 2764 3354.tmp.PwHnaA.exe 60 PID 2764 wrote to memory of 1360 2764 3354.tmp.PwHnaA.exe 60 PID 2764 wrote to memory of 1360 2764 3354.tmp.PwHnaA.exe 60 PID 2764 wrote to memory of 1360 2764 3354.tmp.PwHnaA.exe 60 PID 1360 wrote to memory of 2488 1360 cmd.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe"C:\Users\Admin\AppData\Local\Temp\4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "SystemServicesTools" /tr "C:\Users\Admin\AppData\Roaming\{2864474C38203701991499}\{2864474C38203701991499}.exe" /sc onstart /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2792
-
-
C:\Windows\system32\relog.exeC:\Windows\system32\relog.exe3⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Identities\Service_Identities.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Macromedia\Service_Macromedia.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Media Center Programs\Service_Media Center Programs.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Service_Microsoft.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2228
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Mozilla\Service_Mozilla.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:592
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\{2864474C38203701991499}\Service_{2864474C38203701991499}.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6519.tmp.uIZtAux.exe"C:\Users\Admin\AppData\Local\Temp\6519.tmp.uIZtAux.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\6836.tmp.svchost.exe"C:\Users\Admin\AppData\Local\Temp\6836.tmp.svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /xml "C:\Users\Admin\AppData\Roaming\WinZIP_32\version.xml" /tn WPDR\Config_Error\Version /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp.zbi.exe"C:\Users\Admin\AppData\Local\Temp\7985.tmp.zbi.exe"2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe"C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\onefile_3056_133668297989820000\test.exe"C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\3354.tmp.PwHnaA.exe"C:\Users\Admin\AppData\Local\Temp\3354.tmp.PwHnaA.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1752
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5843.tmp.PPGcgnyW.exe"C:\Users\Admin\AppData\Local\Temp\5843.tmp.PPGcgnyW.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6893.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2896
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D266EBA8-F8A4-4ED0-9BDB-F66802B36212} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
175KB
MD519f436930646f3e8f283fa71f2a4cbcb
SHA199397666d23ddde6078496ee73bde00ae9403393
SHA25640e64ea2d9253f93606f6f62966f05e2bb300e03e82ecd54c5dcba5640df0dff
SHA512addba9ff5bd334ddfec06f87d2c69c06028b82d0aab732f73ef35e84f46d889f48ab6823371a9b9f415e2758e62270866682b833bca7406354802e0157314e0d
-
Filesize
47KB
MD5670d1014ec5713d005f8ddfefc495a9e
SHA191362eaf33dc55e4d970fbefbda975be32628d6b
SHA25670c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd
SHA512175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f
-
Filesize
300KB
MD58d14c4ba7260c61ecde30d97fd3c124a
SHA1f60a7243a5160ff0dd60c37e1de43b81cead3549
SHA2566985ec7f67fabd26633c991be04ce5f899224a56bb078ba186b4be21f9e4714d
SHA512b068decea7ec68d2b4347493d9e4b8cc4fb0c3c5f5ecc2a52be6eb35d28e75d3de1636efe0b67cce825e8d08d3fb82d137b1d6eb1225662fb8c3dff9616dcc4c
-
Filesize
321KB
MD56ddd28445b8fc2485cb72f22d1adc936
SHA1403c02d952120aafc6fb659a0ce0b99b1384442c
SHA256d73a9c06d72b25fc9cc1d3883ba52ba949c91297d20f8cff37481d9b442a7ef7
SHA5129abc68fab4c2a37f6cf07e2d1d7baccf26da411969b6dca4508776b9f57e3ed228dbc1a50e6dc4784791bdb86423d1f20c0f4d118c20d23951906a14ebd4682b
-
Filesize
5.2MB
MD50534ab10184891cd61d262bfd79b7b4c
SHA1a13d37959a92bc37f4d3c42eb53d77cc760f448a
SHA256191272e200345dcb0a7a8c8c975a8b07847f07b9d9f0c3af472fdb88092aee0b
SHA512381af090cc87f2f2b8583c28a164f8f2e978c2bdffe3161d37fa30e38c5e026b90ae5f45dd13f9ded8ee207e4694abf2a58256deb8986ec11d802b7578f6be9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
4.2MB
MD5384349987b60775d6fc3a6d202c3e1bd
SHA1701cb80c55f859ad4a31c53aa744a00d61e467e5
SHA256f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8
SHA5126bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5
-
Filesize
151B
MD564a5b41881b62d758d0eef7169ef65cf
SHA1b3ce0a9f1fcdcf3fa2791260f80a1a5544e861cb
SHA256bdd04d5db45da91e17f60fb561c30dbc55bec0f33ec5a34098bf4886402dc279
SHA512ce6aec283c05befab339a1d7c694467aafc2662509c1b62d378798ba8ee255d95445f33f729976303b58531ae3758a158f35e313262bfc98f6f6529abaa87121
-
Filesize
322KB
MD561c5a8e414a47b8cc2c69e1ac4370a35
SHA1d6d66b31e7ebe3bd032a33fbe35fed2720fae964
SHA2564da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b
SHA512b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92
-
Filesize
1KB
MD52b29aa25ee90747f05e920706e4dfc4f
SHA12ec04aa0574178e5b5245362fdb5b1cfbf4ec637
SHA25693e469a8135addc4822f19a7afb7d02baea8242626188ce3e2b039862fc67511
SHA5122a3f6bda5c957eed82b5fdf39bb33d109c68e39a1e096c944bfe725f027757efa87bc44ea037f9baf47426d0335a12639ff67c626aec3fc1c5c430b2efbf44fb
-
Filesize
1KB
MD5ee9d791fd900430e4d594e5bde5c096a
SHA125dd0ac5926d1d02bf4c9fe60d5aff6b602c9b7d
SHA25674c6900b084deaf2ac76ee2113cfe73509e751c588707395fa2731e9bc154ccd
SHA512cd1c18139594002e96c7094ff731812d9afb45fb34735731fb65eaecbd7918c2379fa52b8eea551ac9c51589827619f898a9a0ac95ee1ad8c0e94b589403efeb
-
Filesize
14.0MB
MD5c04a91e68f4d54aac6959c0f8bfa38b7
SHA150578031ed4a270b3e51a1a99d121c0a47546386
SHA256fd8aed52f0a913f9d59e2f1116da4ce8c8d35d95e631b11972aba80933160923
SHA512133ca344372a8634e5bc4a87851dfe6c8d0ae1cac38d59b6004cec4a29a65973b9b65d0ab4d5dc7ce899672a5361f57e8ecf566b1a1f87f34050dcb97083b3fb
-
Filesize
30.6MB
MD5140c6fc5931bec7542b3dc0b08486c4c
SHA111005a2f4afea3913b027940df459a8cca86f8df
SHA256c5fddb56fcb37d5e29a857a5ff53a584a982ae3a5aff1fc670408b202ab1bb37
SHA512be47ea2464a189e6faa64d54daf59d546907ccea778a735eae3118105942e3d67a3d96e8f27d68d28c56d99078839dec139ace95153bab060ee7654a15863a6a