Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 17:30
Behavioral task
behavioral1
Sample
70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe
Resource
win10v2004-20240730-en
General
-
Target
70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe
-
Size
47KB
-
MD5
670d1014ec5713d005f8ddfefc495a9e
-
SHA1
91362eaf33dc55e4d970fbefbda975be32628d6b
-
SHA256
70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd
-
SHA512
175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f
-
SSDEEP
768:EuwpFTAY3IQWUe9jqmo2qLPzXR8myUdPIvfc2C0b2lnNPVPUXHyk/UQsS25BDZ8x:EuwpFTA4/2KRx0vfb9bgnTUXHmpS2nd+
Malware Config
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
PWhSiRkcxVoa
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
diamotrix
176.111.174.140:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000019dbf-138.dat family_redline behavioral1/memory/2032-140-0x0000000000940000-0x0000000000992000-memory.dmp family_redline -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000018710-13.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts relog.exe -
Executes dropped EXE 6 IoCs
pid Process 3004 svchost.exe 1632 jurakd.exe 2032 11CC.tmp.uIZtAux.exe 2716 37A5.tmp.svchost.exe 356 6328.tmp.zbi.exe 2004 servisis.exe -
Loads dropped DLL 5 IoCs
pid Process 2256 cmd.exe 2556 powershell.exe 2556 powershell.exe 1200 Explorer.EXE 1200 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001a307-146.dat upx behavioral1/memory/2716-147-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2716-161-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2004-167-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2004-168-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Macromedia = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Service_Macromedia.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Media Center Programs = "C:\\Users\\Admin\\AppData\\Roaming\\Media Center Programs\\Service_Media Center Programs.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Service_Microsoft.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Service_Mozilla.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_{6FC1442C7E003158821099} = "C:\\Users\\Admin\\AppData\\Roaming\\{6FC1442C7E003158821099}\\Service_{6FC1442C7E003158821099}.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{6FC1442C7E003158821099}\\{6FC1442C7E003158821099}.exe" jurakd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Service_Adobe.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Identities = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Service_Identities.exe" relog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2556 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2832 1632 jurakd.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11CC.tmp.uIZtAux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37A5.tmp.svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2852 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1172 schtasks.exe 1740 schtasks.exe 1332 schtasks.exe 2788 schtasks.exe 1724 schtasks.exe 284 schtasks.exe 2312 schtasks.exe 2076 schtasks.exe 2700 schtasks.exe 944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 2556 powershell.exe 2556 powershell.exe 2556 powershell.exe 2832 relog.exe 3004 svchost.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 1200 Explorer.EXE 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe 2832 relog.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe Token: SeDebugPrivilege 3004 svchost.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeIncreaseQuotaPrivilege 1632 jurakd.exe Token: SeSecurityPrivilege 1632 jurakd.exe Token: SeTakeOwnershipPrivilege 1632 jurakd.exe Token: SeLoadDriverPrivilege 1632 jurakd.exe Token: SeSystemProfilePrivilege 1632 jurakd.exe Token: SeSystemtimePrivilege 1632 jurakd.exe Token: SeProfSingleProcessPrivilege 1632 jurakd.exe Token: SeIncBasePriorityPrivilege 1632 jurakd.exe Token: SeCreatePagefilePrivilege 1632 jurakd.exe Token: SeBackupPrivilege 1632 jurakd.exe Token: SeRestorePrivilege 1632 jurakd.exe Token: SeShutdownPrivilege 1632 jurakd.exe Token: SeDebugPrivilege 1632 jurakd.exe Token: SeSystemEnvironmentPrivilege 1632 jurakd.exe Token: SeRemoteShutdownPrivilege 1632 jurakd.exe Token: SeUndockPrivilege 1632 jurakd.exe Token: SeManageVolumePrivilege 1632 jurakd.exe Token: 33 1632 jurakd.exe Token: 34 1632 jurakd.exe Token: 35 1632 jurakd.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe Token: SeDebugPrivilege 2832 relog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1788 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 31 PID 2088 wrote to memory of 1788 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 31 PID 2088 wrote to memory of 1788 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 31 PID 2088 wrote to memory of 1788 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 31 PID 2088 wrote to memory of 2256 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 33 PID 2088 wrote to memory of 2256 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 33 PID 2088 wrote to memory of 2256 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 33 PID 2088 wrote to memory of 2256 2088 70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe 33 PID 1788 wrote to memory of 2312 1788 cmd.exe 35 PID 1788 wrote to memory of 2312 1788 cmd.exe 35 PID 1788 wrote to memory of 2312 1788 cmd.exe 35 PID 1788 wrote to memory of 2312 1788 cmd.exe 35 PID 2256 wrote to memory of 2852 2256 cmd.exe 36 PID 2256 wrote to memory of 2852 2256 cmd.exe 36 PID 2256 wrote to memory of 2852 2256 cmd.exe 36 PID 2256 wrote to memory of 2852 2256 cmd.exe 36 PID 2256 wrote to memory of 3004 2256 cmd.exe 37 PID 2256 wrote to memory of 3004 2256 cmd.exe 37 PID 2256 wrote to memory of 3004 2256 cmd.exe 37 PID 2256 wrote to memory of 3004 2256 cmd.exe 37 PID 3004 wrote to memory of 1944 3004 svchost.exe 39 PID 3004 wrote to memory of 1944 3004 svchost.exe 39 PID 3004 wrote to memory of 1944 3004 svchost.exe 39 PID 3004 wrote to memory of 1944 3004 svchost.exe 39 PID 1944 wrote to memory of 2556 1944 cmd.exe 41 PID 1944 wrote to memory of 2556 1944 cmd.exe 41 PID 1944 wrote to memory of 2556 1944 cmd.exe 41 PID 1944 wrote to memory of 2556 1944 cmd.exe 41 PID 2556 wrote to memory of 1632 2556 powershell.exe 42 PID 2556 wrote to memory of 1632 2556 powershell.exe 42 PID 2556 wrote to memory of 1632 2556 powershell.exe 42 PID 2556 wrote to memory of 1632 2556 powershell.exe 42 PID 1632 wrote to memory of 2076 1632 jurakd.exe 43 PID 1632 wrote to memory of 2076 1632 jurakd.exe 43 PID 1632 wrote to memory of 2076 1632 jurakd.exe 43 PID 1632 wrote to memory of 2832 1632 jurakd.exe 45 PID 1632 wrote to memory of 2832 1632 jurakd.exe 45 PID 1632 wrote to memory of 2832 1632 jurakd.exe 45 PID 1632 wrote to memory of 2832 1632 jurakd.exe 45 PID 2832 wrote to memory of 2700 2832 relog.exe 46 PID 2832 wrote to memory of 2700 2832 relog.exe 46 PID 2832 wrote to memory of 2700 2832 relog.exe 46 PID 2832 wrote to memory of 1172 2832 relog.exe 48 PID 2832 wrote to memory of 1172 2832 relog.exe 48 PID 2832 wrote to memory of 1172 2832 relog.exe 48 PID 2832 wrote to memory of 944 2832 relog.exe 50 PID 2832 wrote to memory of 944 2832 relog.exe 50 PID 2832 wrote to memory of 944 2832 relog.exe 50 PID 2832 wrote to memory of 1724 2832 relog.exe 52 PID 2832 wrote to memory of 1724 2832 relog.exe 52 PID 2832 wrote to memory of 1724 2832 relog.exe 52 PID 2832 wrote to memory of 1740 2832 relog.exe 54 PID 2832 wrote to memory of 1740 2832 relog.exe 54 PID 2832 wrote to memory of 1740 2832 relog.exe 54 PID 2832 wrote to memory of 1332 2832 relog.exe 56 PID 2832 wrote to memory of 1332 2832 relog.exe 56 PID 2832 wrote to memory of 1332 2832 relog.exe 56 PID 2832 wrote to memory of 284 2832 relog.exe 58 PID 2832 wrote to memory of 284 2832 relog.exe 58 PID 2832 wrote to memory of 284 2832 relog.exe 58 PID 2832 wrote to memory of 1200 2832 relog.exe 21 PID 2832 wrote to memory of 1200 2832 relog.exe 21 PID 1200 wrote to memory of 2032 1200 Explorer.EXE 61 PID 1200 wrote to memory of 2032 1200 Explorer.EXE 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe"C:\Users\Admin\AppData\Local\Temp\70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF5A5.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2852
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jurakd.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jurakd.exe"'6⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\jurakd.exe"C:\Users\Admin\AppData\Local\Temp\jurakd.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "SystemServicesTools" /tr "C:\Users\Admin\AppData\Roaming\{6FC1442C7E003158821099}\{6FC1442C7E003158821099}.exe" /sc onstart /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2076
-
-
C:\Windows\system32\relog.exeC:\Windows\system32\relog.exe8⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Identities\Service_Identities.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1172
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Macromedia\Service_Macromedia.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:944
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Media Center Programs\Service_Media Center Programs.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Service_Microsoft.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\Mozilla\Service_Mozilla.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1332
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "0Zhco0aPIL" /tr "C:\Users\Admin\AppData\Roaming\{6FC1442C7E003158821099}\Service_{6FC1442C7E003158821099}.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:284
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\11CC.tmp.uIZtAux.exe"C:\Users\Admin\AppData\Local\Temp\11CC.tmp.uIZtAux.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\37A5.tmp.svchost.exe"C:\Users\Admin\AppData\Local\Temp\37A5.tmp.svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /xml "C:\Users\Admin\AppData\Roaming\WinZIP_32\version.xml" /tn WPDR\Config_Error\Version /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\6328.tmp.zbi.exe"C:\Users\Admin\AppData\Local\Temp\6328.tmp.zbi.exe"2⤵
- Executes dropped EXE
PID:356
-
-
C:\Users\Admin\AppData\Local\Temp\2EB1.tmp.sahyu.exe"C:\Users\Admin\AppData\Local\Temp\2EB1.tmp.sahyu.exe"2⤵PID:2616
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {582F080B-F198-49B2-9E50-7AEE5CB1905B} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵PID:1388
-
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD58d14c4ba7260c61ecde30d97fd3c124a
SHA1f60a7243a5160ff0dd60c37e1de43b81cead3549
SHA2566985ec7f67fabd26633c991be04ce5f899224a56bb078ba186b4be21f9e4714d
SHA512b068decea7ec68d2b4347493d9e4b8cc4fb0c3c5f5ecc2a52be6eb35d28e75d3de1636efe0b67cce825e8d08d3fb82d137b1d6eb1225662fb8c3dff9616dcc4c
-
Filesize
547KB
MD5839450f0064947f1e7795de285ced509
SHA11c0e072859b68237b4cd108aab9080bd4d3b1547
SHA2566569ec5cded72fa46470b29596a710f6003e0945318ce84f01102ffab5a1b084
SHA512cf31946e9ee0743ad9ff47395fb52df96e8df35cf6e4f88ca764971ca4a042e1aed472dc2a004f645dfaf45127a341ccfc2936cc1d409bd9b00e2efc2a9bfe21
-
Filesize
321KB
MD56ddd28445b8fc2485cb72f22d1adc936
SHA1403c02d952120aafc6fb659a0ce0b99b1384442c
SHA256d73a9c06d72b25fc9cc1d3883ba52ba949c91297d20f8cff37481d9b442a7ef7
SHA5129abc68fab4c2a37f6cf07e2d1d7baccf26da411969b6dca4508776b9f57e3ed228dbc1a50e6dc4784791bdb86423d1f20c0f4d118c20d23951906a14ebd4682b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
322KB
MD561c5a8e414a47b8cc2c69e1ac4370a35
SHA1d6d66b31e7ebe3bd032a33fbe35fed2720fae964
SHA2564da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b
SHA512b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92
-
Filesize
151B
MD5a3292113d8c13d6aa5018c7357cd9395
SHA120e4d7e74de4c63574513299a28a25860358ed22
SHA256bc5c36dd157c0d13e447556dfb6fe8647883466a0d3fb14eb858bc619090f068
SHA5125ec80984d926c7149b17b1d67e2b5f14743c6df71d32695c3e5784fa9fff7f5f3199d13adeaabd9618fd69ba17cd58d8e1252e1177d852463a49f59c7c86fa8d
-
Filesize
1KB
MD52b29aa25ee90747f05e920706e4dfc4f
SHA12ec04aa0574178e5b5245362fdb5b1cfbf4ec637
SHA25693e469a8135addc4822f19a7afb7d02baea8242626188ce3e2b039862fc67511
SHA5122a3f6bda5c957eed82b5fdf39bb33d109c68e39a1e096c944bfe725f027757efa87bc44ea037f9baf47426d0335a12639ff67c626aec3fc1c5c430b2efbf44fb
-
Filesize
1KB
MD5ee9d791fd900430e4d594e5bde5c096a
SHA125dd0ac5926d1d02bf4c9fe60d5aff6b602c9b7d
SHA25674c6900b084deaf2ac76ee2113cfe73509e751c588707395fa2731e9bc154ccd
SHA512cd1c18139594002e96c7094ff731812d9afb45fb34735731fb65eaecbd7918c2379fa52b8eea551ac9c51589827619f898a9a0ac95ee1ad8c0e94b589403efeb
-
Filesize
960KB
MD50e097ef8e4fe52e39f0c87b8711bf6a3
SHA1a4c30e6e4f697efa6ae3e4ba154c995ed471bee0
SHA256ffa4fff79236786b450ad74312e7d691847b5e01fe5c97abfc63e3658f3b036c
SHA512c8a3d13b0ae8c7a10e14db10f9cacf992e8feab4b9ffc54a18c25caf75c7cb1cfc01a026c5bd057f0460f304e1946b182891d3a9f0b399457f27e97830baa5fd
-
Filesize
5.2MB
MD50534ab10184891cd61d262bfd79b7b4c
SHA1a13d37959a92bc37f4d3c42eb53d77cc760f448a
SHA256191272e200345dcb0a7a8c8c975a8b07847f07b9d9f0c3af472fdb88092aee0b
SHA512381af090cc87f2f2b8583c28a164f8f2e978c2bdffe3161d37fa30e38c5e026b90ae5f45dd13f9ded8ee207e4694abf2a58256deb8986ec11d802b7578f6be9d
-
Filesize
47KB
MD5670d1014ec5713d005f8ddfefc495a9e
SHA191362eaf33dc55e4d970fbefbda975be32628d6b
SHA25670c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd
SHA512175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f