Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 01:21
Static task
static1
General
-
Target
726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe
-
Size
4.6MB
-
MD5
513e198d8d3251a4114115603be2ef5b
-
SHA1
fc273f9f478d807b87bf17c9ebedd49fe4451509
-
SHA256
726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94
-
SHA512
b689ea55a907f743af6f6c44cd175ca7dccd346fffca25aae9f472745d8c4248dd9f0ec8380fb936e95067d35768282991b327073c29baab1c78bf57559004c9
-
SSDEEP
98304:IsTtFCMoEBCSbrQJEqAQPqGwxMDYNaYHzPcLZc/9fFQucTeu52Xu:IitFXoBo0rVwxWYNzHg21NQucTj5w
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 12 IoCs
resource yara_rule behavioral1/memory/1524-115-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-116-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-114-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-113-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-112-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-111-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-110-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-109-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-108-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-107-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-106-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral1/memory/1524-117-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat -
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BLClOKQwCpC7NEW.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AsuUQa4j6S2HpNn.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1588 powershell.exe 484 powershell.exe 1984 powershell.exe 2988 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AsuUQa4j6S2HpNn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AsuUQa4j6S2HpNn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BLClOKQwCpC7NEW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BLClOKQwCpC7NEW.exe -
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 1116 BLClOKQwCpC7NEW.exe 1524 AsuUQa4j6S2HpNn.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1116-40-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-44-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-42-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-57-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-55-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-52-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-50-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-48-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-46-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-61-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-64-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-68-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-67-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-69-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-66-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-65-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-63-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-62-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-60-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-59-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1116-58-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral1/memory/1524-103-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-100-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-96-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-94-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-92-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-90-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-88-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-98-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-105-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-115-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-116-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-114-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-113-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-112-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-111-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-110-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-109-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-108-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-107-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-106-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral1/memory/1524-117-0x0000000000400000-0x0000000000A0A000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BLClOKQwCpC7NEW.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AsuUQa4j6S2HpNn.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1116 BLClOKQwCpC7NEW.exe 1524 AsuUQa4j6S2HpNn.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2756 set thread context of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2532 set thread context of 1524 2532 AsuUQa4j6S2HpNn.exe 52 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLClOKQwCpC7NEW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsuUQa4j6S2HpNn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsuUQa4j6S2HpNn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLClOKQwCpC7NEW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1048 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe 1624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2756 BLClOKQwCpC7NEW.exe 1984 powershell.exe 484 powershell.exe 2756 BLClOKQwCpC7NEW.exe 1116 BLClOKQwCpC7NEW.exe 1116 BLClOKQwCpC7NEW.exe 1116 BLClOKQwCpC7NEW.exe 2532 AsuUQa4j6S2HpNn.exe 2532 AsuUQa4j6S2HpNn.exe 2532 AsuUQa4j6S2HpNn.exe 2988 powershell.exe 1588 powershell.exe 2532 AsuUQa4j6S2HpNn.exe 1524 AsuUQa4j6S2HpNn.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe Token: SeIncreaseQuotaPrivilege 2800 WMIC.exe Token: SeSecurityPrivilege 2800 WMIC.exe Token: SeTakeOwnershipPrivilege 2800 WMIC.exe Token: SeLoadDriverPrivilege 2800 WMIC.exe Token: SeSystemProfilePrivilege 2800 WMIC.exe Token: SeSystemtimePrivilege 2800 WMIC.exe Token: SeProfSingleProcessPrivilege 2800 WMIC.exe Token: SeIncBasePriorityPrivilege 2800 WMIC.exe Token: SeCreatePagefilePrivilege 2800 WMIC.exe Token: SeBackupPrivilege 2800 WMIC.exe Token: SeRestorePrivilege 2800 WMIC.exe Token: SeShutdownPrivilege 2800 WMIC.exe Token: SeDebugPrivilege 2800 WMIC.exe Token: SeSystemEnvironmentPrivilege 2800 WMIC.exe Token: SeRemoteShutdownPrivilege 2800 WMIC.exe Token: SeUndockPrivilege 2800 WMIC.exe Token: SeManageVolumePrivilege 2800 WMIC.exe Token: 33 2800 WMIC.exe Token: 34 2800 WMIC.exe Token: 35 2800 WMIC.exe Token: SeIncreaseQuotaPrivilege 2800 WMIC.exe Token: SeSecurityPrivilege 2800 WMIC.exe Token: SeTakeOwnershipPrivilege 2800 WMIC.exe Token: SeLoadDriverPrivilege 2800 WMIC.exe Token: SeSystemProfilePrivilege 2800 WMIC.exe Token: SeSystemtimePrivilege 2800 WMIC.exe Token: SeProfSingleProcessPrivilege 2800 WMIC.exe Token: SeIncBasePriorityPrivilege 2800 WMIC.exe Token: SeCreatePagefilePrivilege 2800 WMIC.exe Token: SeBackupPrivilege 2800 WMIC.exe Token: SeRestorePrivilege 2800 WMIC.exe Token: SeShutdownPrivilege 2800 WMIC.exe Token: SeDebugPrivilege 2800 WMIC.exe Token: SeSystemEnvironmentPrivilege 2800 WMIC.exe Token: SeRemoteShutdownPrivilege 2800 WMIC.exe Token: SeUndockPrivilege 2800 WMIC.exe Token: SeManageVolumePrivilege 2800 WMIC.exe Token: 33 2800 WMIC.exe Token: 34 2800 WMIC.exe Token: 35 2800 WMIC.exe Token: SeDebugPrivilege 2532 AsuUQa4j6S2HpNn.exe Token: SeDebugPrivilege 2756 BLClOKQwCpC7NEW.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 484 powershell.exe Token: SeDebugPrivilege 1116 BLClOKQwCpC7NEW.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 1524 AsuUQa4j6S2HpNn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1116 BLClOKQwCpC7NEW.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2760 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 30 PID 2644 wrote to memory of 2760 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 30 PID 2644 wrote to memory of 2760 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 30 PID 2760 wrote to memory of 2800 2760 cmd.exe 32 PID 2760 wrote to memory of 2800 2760 cmd.exe 32 PID 2760 wrote to memory of 2800 2760 cmd.exe 32 PID 2644 wrote to memory of 2756 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 34 PID 2644 wrote to memory of 2756 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 34 PID 2644 wrote to memory of 2756 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 34 PID 2644 wrote to memory of 2756 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 34 PID 2644 wrote to memory of 2532 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 35 PID 2644 wrote to memory of 2532 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 35 PID 2644 wrote to memory of 2532 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 35 PID 2644 wrote to memory of 2532 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 35 PID 2644 wrote to memory of 2920 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 36 PID 2644 wrote to memory of 2920 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 36 PID 2644 wrote to memory of 2920 2644 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 36 PID 2920 wrote to memory of 1048 2920 cmd.exe 38 PID 2920 wrote to memory of 1048 2920 cmd.exe 38 PID 2920 wrote to memory of 1048 2920 cmd.exe 38 PID 2756 wrote to memory of 484 2756 BLClOKQwCpC7NEW.exe 39 PID 2756 wrote to memory of 484 2756 BLClOKQwCpC7NEW.exe 39 PID 2756 wrote to memory of 484 2756 BLClOKQwCpC7NEW.exe 39 PID 2756 wrote to memory of 484 2756 BLClOKQwCpC7NEW.exe 39 PID 2756 wrote to memory of 1984 2756 BLClOKQwCpC7NEW.exe 41 PID 2756 wrote to memory of 1984 2756 BLClOKQwCpC7NEW.exe 41 PID 2756 wrote to memory of 1984 2756 BLClOKQwCpC7NEW.exe 41 PID 2756 wrote to memory of 1984 2756 BLClOKQwCpC7NEW.exe 41 PID 2756 wrote to memory of 1652 2756 BLClOKQwCpC7NEW.exe 43 PID 2756 wrote to memory of 1652 2756 BLClOKQwCpC7NEW.exe 43 PID 2756 wrote to memory of 1652 2756 BLClOKQwCpC7NEW.exe 43 PID 2756 wrote to memory of 1652 2756 BLClOKQwCpC7NEW.exe 43 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2756 wrote to memory of 1116 2756 BLClOKQwCpC7NEW.exe 45 PID 2532 wrote to memory of 2988 2532 AsuUQa4j6S2HpNn.exe 46 PID 2532 wrote to memory of 2988 2532 AsuUQa4j6S2HpNn.exe 46 PID 2532 wrote to memory of 2988 2532 AsuUQa4j6S2HpNn.exe 46 PID 2532 wrote to memory of 2988 2532 AsuUQa4j6S2HpNn.exe 46 PID 2532 wrote to memory of 1588 2532 AsuUQa4j6S2HpNn.exe 48 PID 2532 wrote to memory of 1588 2532 AsuUQa4j6S2HpNn.exe 48 PID 2532 wrote to memory of 1588 2532 AsuUQa4j6S2HpNn.exe 48 PID 2532 wrote to memory of 1588 2532 AsuUQa4j6S2HpNn.exe 48 PID 2532 wrote to memory of 1624 2532 AsuUQa4j6S2HpNn.exe 49 PID 2532 wrote to memory of 1624 2532 AsuUQa4j6S2HpNn.exe 49 PID 2532 wrote to memory of 1624 2532 AsuUQa4j6S2HpNn.exe 49 PID 2532 wrote to memory of 1624 2532 AsuUQa4j6S2HpNn.exe 49 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52 PID 2532 wrote to memory of 1524 2532 AsuUQa4j6S2HpNn.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.exe"cmd" /C wmic path win32_ComputerSystem get model2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_ComputerSystem get model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sgBDFAKb.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sgBDFAKb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5744.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XyJQWVqVwSU.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XyJQWVqVwSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E8B.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\timeout.exeTIMEOUT /T 33⤵
- Delays execution with timeout.exe
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD520cf29e88f8334623bacf9b4a786583f
SHA192177c432f500254d8b1b7531898a7f73a9f2ab6
SHA2566b0ee9d248c8927e65ada232489f00f04febc1d735d58637a881237c09371a12
SHA512131056feef1acb34d5f18b0a4997240314809f9800beda7c7878d9f0506ae10d707f458abb0e1f5dc9ab86c28a3d94801a4c9654320a8608b55c256edbe6ce30
-
Filesize
2.3MB
MD53111fce09bd593632338703ec7b79ec4
SHA10692697feadf4502ca36d468de45942d9857f9b5
SHA256ddbaa3837446cb7c45a6f00ab198d6460a16db74d869887d2e9d0de37ff364e2
SHA5122e0ef5795621b6d9b80a16949d512a7ca18415397f3dd515608b0f998fae0b3c9c4b720d867396a4a1e894460f185c5150615f9115e8e11a008b5ccc4721ccd6
-
Filesize
1KB
MD5800b9c2a720a4670d4cfa7eec9e735ea
SHA11265888aa658ae743c95c9afc9b51c6fcb4d0064
SHA256198798155a02db59b5218986efe5716e84aaf211eb7723489f2ca0f03d07d6b9
SHA51242ca7600220eed948aefe4fd97c210d4aa2ea6d259053f43ef2e756236381ef88fc84eea3e36e88afe7c024ced201bd2c1fb638aefeab7e018e1f99e329f0739
-
Filesize
1KB
MD5d22986d518f9224e416136a4dd2257f0
SHA1d8e6c4464737ceaaafbf1a70e206e4edb8c3d6ab
SHA2561f6398fcdd9504151fc8e5ed1d3ef46d9e4b40497770ee2dc7804ed82c8600ae
SHA512d520a1392770317aa96905ff7766da053cc7d1ea32e739737bb8d75418f54e67a0e69cfc5d3d64028c19ab606fe7cd6c84633eb6ec6dd805144b2f528a0689e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5474da173799ca2a886cb4923563354fd
SHA118002113972aabcb9caaabf3a74559928e81fab5
SHA2567de6f4df1fd58bd025f006e119b58cd80f0507503a8b137d7a6993be9ce34efd
SHA512a6a13fff197f662106df45f5a39af114ae5c6d62c4ba07d20b1a69d4c767d66dd2df6623c84e1573791cce7beec9143bd50082ddee784b5ed816b232275418d8