Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 01:21
Static task
static1
General
-
Target
726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe
-
Size
4.6MB
-
MD5
513e198d8d3251a4114115603be2ef5b
-
SHA1
fc273f9f478d807b87bf17c9ebedd49fe4451509
-
SHA256
726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94
-
SHA512
b689ea55a907f743af6f6c44cd175ca7dccd346fffca25aae9f472745d8c4248dd9f0ec8380fb936e95067d35768282991b327073c29baab1c78bf57559004c9
-
SSDEEP
98304:IsTtFCMoEBCSbrQJEqAQPqGwxMDYNaYHzPcLZc/9fFQucTeu52Xu:IitFXoBo0rVwxWYNzHg21NQucTj5w
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Extracted
gurcu
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/sendDocumen
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Gurcu family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 13 IoCs
resource yara_rule behavioral2/memory/2768-79-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-80-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-82-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-86-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-78-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-77-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-75-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-73-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-74-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-72-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-71-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-81-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat behavioral2/memory/2768-76-0x0000000000400000-0x0000000000A0A000-memory.dmp family_sectoprat -
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AsuUQa4j6S2HpNn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BLClOKQwCpC7NEW.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2492 powershell.exe 4312 powershell.exe 1272 powershell.exe 2436 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AsuUQa4j6S2HpNn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AsuUQa4j6S2HpNn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BLClOKQwCpC7NEW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BLClOKQwCpC7NEW.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation BLClOKQwCpC7NEW.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation AsuUQa4j6S2HpNn.exe -
Executes dropped EXE 9 IoCs
pid Process 2284 BLClOKQwCpC7NEW.exe 4220 AsuUQa4j6S2HpNn.exe 2388 AsuUQa4j6S2HpNn.exe 3944 AsuUQa4j6S2HpNn.exe 2768 AsuUQa4j6S2HpNn.exe 4028 BLClOKQwCpC7NEW.exe 1224 BLClOKQwCpC7NEW.exe 4912 BLClOKQwCpC7NEW.exe 3188 BLClOKQwCpC7NEW.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2768-53-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-70-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-79-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-80-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-82-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-86-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-78-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-77-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-75-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-73-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-74-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-72-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-71-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-81-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/2768-76-0x0000000000400000-0x0000000000A0A000-memory.dmp themida behavioral2/memory/3188-158-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-156-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-161-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-169-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-170-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-172-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-167-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-168-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-166-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-164-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-162-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-165-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-163-0x0000000000400000-0x0000000000A20000-memory.dmp themida behavioral2/memory/3188-160-0x0000000000400000-0x0000000000A20000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AsuUQa4j6S2HpNn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BLClOKQwCpC7NEW.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2768 AsuUQa4j6S2HpNn.exe 3188 BLClOKQwCpC7NEW.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4220 set thread context of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 2284 set thread context of 3188 2284 BLClOKQwCpC7NEW.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsuUQa4j6S2HpNn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLClOKQwCpC7NEW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsuUQa4j6S2HpNn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLClOKQwCpC7NEW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5036 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3188 schtasks.exe 2188 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 4220 AsuUQa4j6S2HpNn.exe 2284 BLClOKQwCpC7NEW.exe 4220 AsuUQa4j6S2HpNn.exe 2284 BLClOKQwCpC7NEW.exe 4220 AsuUQa4j6S2HpNn.exe 2284 BLClOKQwCpC7NEW.exe 4220 AsuUQa4j6S2HpNn.exe 2284 BLClOKQwCpC7NEW.exe 2436 powershell.exe 2436 powershell.exe 1272 powershell.exe 1272 powershell.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 4220 AsuUQa4j6S2HpNn.exe 2768 AsuUQa4j6S2HpNn.exe 2768 AsuUQa4j6S2HpNn.exe 1272 powershell.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2436 powershell.exe 2284 BLClOKQwCpC7NEW.exe 2492 powershell.exe 2492 powershell.exe 4312 powershell.exe 4312 powershell.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 2284 BLClOKQwCpC7NEW.exe 4312 powershell.exe 2284 BLClOKQwCpC7NEW.exe 2492 powershell.exe 3188 BLClOKQwCpC7NEW.exe 3188 BLClOKQwCpC7NEW.exe 3188 BLClOKQwCpC7NEW.exe 3188 BLClOKQwCpC7NEW.exe 3188 BLClOKQwCpC7NEW.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe Token: SeIncreaseQuotaPrivilege 208 WMIC.exe Token: SeSecurityPrivilege 208 WMIC.exe Token: SeTakeOwnershipPrivilege 208 WMIC.exe Token: SeLoadDriverPrivilege 208 WMIC.exe Token: SeSystemProfilePrivilege 208 WMIC.exe Token: SeSystemtimePrivilege 208 WMIC.exe Token: SeProfSingleProcessPrivilege 208 WMIC.exe Token: SeIncBasePriorityPrivilege 208 WMIC.exe Token: SeCreatePagefilePrivilege 208 WMIC.exe Token: SeBackupPrivilege 208 WMIC.exe Token: SeRestorePrivilege 208 WMIC.exe Token: SeShutdownPrivilege 208 WMIC.exe Token: SeDebugPrivilege 208 WMIC.exe Token: SeSystemEnvironmentPrivilege 208 WMIC.exe Token: SeRemoteShutdownPrivilege 208 WMIC.exe Token: SeUndockPrivilege 208 WMIC.exe Token: SeManageVolumePrivilege 208 WMIC.exe Token: 33 208 WMIC.exe Token: 34 208 WMIC.exe Token: 35 208 WMIC.exe Token: 36 208 WMIC.exe Token: SeIncreaseQuotaPrivilege 208 WMIC.exe Token: SeSecurityPrivilege 208 WMIC.exe Token: SeTakeOwnershipPrivilege 208 WMIC.exe Token: SeLoadDriverPrivilege 208 WMIC.exe Token: SeSystemProfilePrivilege 208 WMIC.exe Token: SeSystemtimePrivilege 208 WMIC.exe Token: SeProfSingleProcessPrivilege 208 WMIC.exe Token: SeIncBasePriorityPrivilege 208 WMIC.exe Token: SeCreatePagefilePrivilege 208 WMIC.exe Token: SeBackupPrivilege 208 WMIC.exe Token: SeRestorePrivilege 208 WMIC.exe Token: SeShutdownPrivilege 208 WMIC.exe Token: SeDebugPrivilege 208 WMIC.exe Token: SeSystemEnvironmentPrivilege 208 WMIC.exe Token: SeRemoteShutdownPrivilege 208 WMIC.exe Token: SeUndockPrivilege 208 WMIC.exe Token: SeManageVolumePrivilege 208 WMIC.exe Token: 33 208 WMIC.exe Token: 34 208 WMIC.exe Token: 35 208 WMIC.exe Token: 36 208 WMIC.exe Token: SeDebugPrivilege 2284 BLClOKQwCpC7NEW.exe Token: SeDebugPrivilege 4220 AsuUQa4j6S2HpNn.exe Token: SeDebugPrivilege 1272 powershell.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2768 AsuUQa4j6S2HpNn.exe Token: SeDebugPrivilege 4312 powershell.exe Token: SeDebugPrivilege 2492 powershell.exe Token: SeDebugPrivilege 3188 BLClOKQwCpC7NEW.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3188 BLClOKQwCpC7NEW.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 4072 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 84 PID 2768 wrote to memory of 4072 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 84 PID 4072 wrote to memory of 208 4072 cmd.exe 86 PID 4072 wrote to memory of 208 4072 cmd.exe 86 PID 2768 wrote to memory of 2284 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 89 PID 2768 wrote to memory of 2284 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 89 PID 2768 wrote to memory of 2284 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 89 PID 2768 wrote to memory of 4220 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 90 PID 2768 wrote to memory of 4220 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 90 PID 2768 wrote to memory of 4220 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 90 PID 2768 wrote to memory of 1976 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 91 PID 2768 wrote to memory of 1976 2768 726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe 91 PID 1976 wrote to memory of 5036 1976 cmd.exe 93 PID 1976 wrote to memory of 5036 1976 cmd.exe 93 PID 4220 wrote to memory of 1272 4220 AsuUQa4j6S2HpNn.exe 103 PID 4220 wrote to memory of 1272 4220 AsuUQa4j6S2HpNn.exe 103 PID 4220 wrote to memory of 1272 4220 AsuUQa4j6S2HpNn.exe 103 PID 4220 wrote to memory of 2436 4220 AsuUQa4j6S2HpNn.exe 105 PID 4220 wrote to memory of 2436 4220 AsuUQa4j6S2HpNn.exe 105 PID 4220 wrote to memory of 2436 4220 AsuUQa4j6S2HpNn.exe 105 PID 4220 wrote to memory of 3188 4220 AsuUQa4j6S2HpNn.exe 123 PID 4220 wrote to memory of 3188 4220 AsuUQa4j6S2HpNn.exe 123 PID 4220 wrote to memory of 3188 4220 AsuUQa4j6S2HpNn.exe 123 PID 4220 wrote to memory of 2388 4220 AsuUQa4j6S2HpNn.exe 109 PID 4220 wrote to memory of 2388 4220 AsuUQa4j6S2HpNn.exe 109 PID 4220 wrote to memory of 2388 4220 AsuUQa4j6S2HpNn.exe 109 PID 4220 wrote to memory of 3944 4220 AsuUQa4j6S2HpNn.exe 110 PID 4220 wrote to memory of 3944 4220 AsuUQa4j6S2HpNn.exe 110 PID 4220 wrote to memory of 3944 4220 AsuUQa4j6S2HpNn.exe 110 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 4220 wrote to memory of 2768 4220 AsuUQa4j6S2HpNn.exe 111 PID 2284 wrote to memory of 4312 2284 BLClOKQwCpC7NEW.exe 114 PID 2284 wrote to memory of 4312 2284 BLClOKQwCpC7NEW.exe 114 PID 2284 wrote to memory of 4312 2284 BLClOKQwCpC7NEW.exe 114 PID 2284 wrote to memory of 2492 2284 BLClOKQwCpC7NEW.exe 116 PID 2284 wrote to memory of 2492 2284 BLClOKQwCpC7NEW.exe 116 PID 2284 wrote to memory of 2492 2284 BLClOKQwCpC7NEW.exe 116 PID 2284 wrote to memory of 2188 2284 BLClOKQwCpC7NEW.exe 118 PID 2284 wrote to memory of 2188 2284 BLClOKQwCpC7NEW.exe 118 PID 2284 wrote to memory of 2188 2284 BLClOKQwCpC7NEW.exe 118 PID 2284 wrote to memory of 4028 2284 BLClOKQwCpC7NEW.exe 120 PID 2284 wrote to memory of 4028 2284 BLClOKQwCpC7NEW.exe 120 PID 2284 wrote to memory of 4028 2284 BLClOKQwCpC7NEW.exe 120 PID 2284 wrote to memory of 1224 2284 BLClOKQwCpC7NEW.exe 121 PID 2284 wrote to memory of 1224 2284 BLClOKQwCpC7NEW.exe 121 PID 2284 wrote to memory of 1224 2284 BLClOKQwCpC7NEW.exe 121 PID 2284 wrote to memory of 4912 2284 BLClOKQwCpC7NEW.exe 122 PID 2284 wrote to memory of 4912 2284 BLClOKQwCpC7NEW.exe 122 PID 2284 wrote to memory of 4912 2284 BLClOKQwCpC7NEW.exe 122 PID 2284 wrote to memory of 3188 2284 BLClOKQwCpC7NEW.exe 123 PID 2284 wrote to memory of 3188 2284 BLClOKQwCpC7NEW.exe 123 PID 2284 wrote to memory of 3188 2284 BLClOKQwCpC7NEW.exe 123 PID 2284 wrote to memory of 3188 2284 BLClOKQwCpC7NEW.exe 123 PID 2284 wrote to memory of 3188 2284 BLClOKQwCpC7NEW.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /C wmic path win32_ComputerSystem get model2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_ComputerSystem get model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sgBDFAKb.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sgBDFAKb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE7B0.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"3⤵
- Executes dropped EXE
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"3⤵
- Executes dropped EXE
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"3⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"C:\Users\Admin\AppData\Local\Temp\PEQUwNvwEW\BLClOKQwCpC7NEW.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XyJQWVqVwSU.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XyJQWVqVwSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD448.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"3⤵
- Executes dropped EXE
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"3⤵
- Executes dropped EXE
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"C:\Users\Admin\AppData\Local\Temp\cHUnEQyHoEpn\AsuUQa4j6S2HpNn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\timeout.exeTIMEOUT /T 33⤵
- Delays execution with timeout.exe
PID:5036
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD560bf6fee9d3363d35b00ce55bf516a55
SHA14fde93defca239fc85a2a0818b24c9e1e4294a2a
SHA256bc8820752330d9551439a501538c44e702c52558b102e4c33f987413b17740e1
SHA5125356e7c27bb2b6c0a5ca44e402fc3a768703140acfb3b0227728e47eadb4e15a2f789a4d333d161be3f5a6b0ac3e39e4e23d645db2fc26c667698e44913d41d1
-
Filesize
18KB
MD5b1198e7bf50ef29f4ecf34ca50d0c311
SHA1ca18a2263b6596b7920ac47457a7f10a3cf23b9a
SHA25631d5dcbc0e4b573c98b28e3251331776a308f64b63086fcebb763cd688b26bb0
SHA5123d9f78b6d70830c4e0405128b7c0a4642f590004c24c01cd5fb3f4da656671be8046877baebc0e525660a419b6cd6cba24a5d95b53ba26a664e7d96205033b57
-
Filesize
2.3MB
MD53111fce09bd593632338703ec7b79ec4
SHA10692697feadf4502ca36d468de45942d9857f9b5
SHA256ddbaa3837446cb7c45a6f00ab198d6460a16db74d869887d2e9d0de37ff364e2
SHA5122e0ef5795621b6d9b80a16949d512a7ca18415397f3dd515608b0f998fae0b3c9c4b720d867396a4a1e894460f185c5150615f9115e8e11a008b5ccc4721ccd6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.3MB
MD520cf29e88f8334623bacf9b4a786583f
SHA192177c432f500254d8b1b7531898a7f73a9f2ab6
SHA2566b0ee9d248c8927e65ada232489f00f04febc1d735d58637a881237c09371a12
SHA512131056feef1acb34d5f18b0a4997240314809f9800beda7c7878d9f0506ae10d707f458abb0e1f5dc9ab86c28a3d94801a4c9654320a8608b55c256edbe6ce30
-
Filesize
1KB
MD5fc63c5f5ed2055d08a006f171da8db60
SHA1c842d906772fb8976a24212dfefd8b64626ab3b3
SHA256bbc4d763da7d93739fd2519cc933841e38eca86277cac35411a7b40771ea33dd
SHA5128f50f6d4799ece341c9baf4617b56eb31af6f962b29195849c4b68ad957051ae0d8c859d176f03be3c6edd553fc48f8633e528eb3c86be305754313951a1e422
-
Filesize
1KB
MD5ae64c5e543f8bb62b9cca7966d77fb28
SHA1ad5a8f698b6ede588cf17d8e6e576aadbeef032b
SHA256d2d91aa84f33d5c216671ff6f15de6b13af65fef29cc17fd58ff58e1bc4b691c
SHA512c88c320f730f5bd2e6a858e3cb5c404cd2aacabda90dcf41555dbea3eb6bf2279724c2c4177155b83bc560b1cbb030755f88e4a4377ba89d9a13c1947b52997a