Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
476257ebcbb7ecfa831e625b1d110d6b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
476257ebcbb7ecfa831e625b1d110d6b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240708-en
General
-
Target
setup_installer.exe
-
Size
7.8MB
-
MD5
62c031e5a7ff452d122856ceb0fab07d
-
SHA1
d4ec184055acd1fa5cee0e9a0af478ce21c6921d
-
SHA256
e2ccabb2928b7d5f92e55cc60a4ed9e9e0c67349b393adf6eb8072980f5ebefa
-
SHA512
019cebfbf9bb36c1a57494332e724aac6d3e8afd35a76ed01ee337191c0faf46822f339db883340132ec4d433fee31afd315620c3d705f989b6d0d8750d5c67c
-
SSDEEP
196608:xoYSPl5z0o/SJsI5von1MTtZfXSjUrJvO3toM/6r:xoYAlB0oaayvwMTnSSJvOadr
Malware Config
Extracted
smokeloader
pub3
Extracted
redline
bernard05
141.95.211.151:34846
-
auth_value
0ca8e0ce5f601474792a9d04a56b69f8
Extracted
gcleaner
31.210.20.149
212.192.241.16
212.192.246.217
203.159.80.49
Signatures
-
Detect Fabookie payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4452-76-0x0000000140000000-0x0000000140615000-memory.dmp family_fabookie -
Fabookie family
-
Gcleaner family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4844-149-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup_installer.exe628e54dd948c8_bdbfe0e55.exe628e54e02a93b_c820032.tmp628e54e90ed62_5334eb4d12.exe628e54e3a0747_ed24a9c5da.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 628e54dd948c8_bdbfe0e55.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 628e54e02a93b_c820032.tmp Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 628e54e90ed62_5334eb4d12.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 628e54e3a0747_ed24a9c5da.exe -
Executes dropped EXE 19 IoCs
Processes:
setup_install.exe628e54e108f5b_e0c250f52b.exe628e54db139b7_3622eb547b.exe628e54e90ed62_5334eb4d12.exe628e54dd948c8_bdbfe0e55.exe628e54dc06ca5_d13f73d.exe628e54e7eb628_9d99fab57f.exe628e54e5260e5_73b5a3dba.exe628e54eb12f29_19a8386c8a.exe628e54e02a93b_c820032.exe628e54e3a0747_ed24a9c5da.exe628e54e6a6a3b_9dab9e.exe628e54eb12f29_19a8386c8a.tmp628e54e02a93b_c820032.tmp628e54e7eb628_9d99fab57f.exe628e54dd948c8_bdbfe0e55.exe628e54e02a93b_c820032.exe628e54e02a93b_c820032.tmp628e54dc06ca5_d13f73d.exepid process 1124 setup_install.exe 1772 628e54e108f5b_e0c250f52b.exe 2648 628e54db139b7_3622eb547b.exe 1796 628e54e90ed62_5334eb4d12.exe 4336 628e54dd948c8_bdbfe0e55.exe 3960 628e54dc06ca5_d13f73d.exe 4464 628e54e7eb628_9d99fab57f.exe 2396 628e54e5260e5_73b5a3dba.exe 1416 628e54eb12f29_19a8386c8a.exe 4944 628e54e02a93b_c820032.exe 392 628e54e3a0747_ed24a9c5da.exe 4452 628e54e6a6a3b_9dab9e.exe 3172 628e54eb12f29_19a8386c8a.tmp 4968 628e54e02a93b_c820032.tmp 3048 628e54e7eb628_9d99fab57f.exe 4344 628e54dd948c8_bdbfe0e55.exe 4380 628e54e02a93b_c820032.exe 460 628e54e02a93b_c820032.tmp 4844 628e54dc06ca5_d13f73d.exe -
Loads dropped DLL 6 IoCs
Processes:
setup_install.exe628e54eb12f29_19a8386c8a.tmp628e54e02a93b_c820032.tmp628e54e02a93b_c820032.tmpregsvr32.exepid process 1124 setup_install.exe 3172 628e54eb12f29_19a8386c8a.tmp 4968 628e54e02a93b_c820032.tmp 460 628e54e02a93b_c820032.tmp 2484 regsvr32.exe 2484 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e6a6a3b_9dab9e.exe vmprotect behavioral4/memory/4452-76-0x0000000140000000-0x0000000140615000-memory.dmp vmprotect -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
628e54e7eb628_9d99fab57f.exe628e54dc06ca5_d13f73d.exedescription pid process target process PID 4464 set thread context of 3048 4464 628e54e7eb628_9d99fab57f.exe 628e54e7eb628_9d99fab57f.exe PID 3960 set thread context of 4844 3960 628e54dc06ca5_d13f73d.exe 628e54dc06ca5_d13f73d.exe -
Drops file in Program Files directory 3 IoCs
Processes:
628e54e02a93b_c820032.tmpdescription ioc process File created C:\Program Files (x86)\myinstaller\unins000.dat 628e54e02a93b_c820032.tmp File created C:\Program Files (x86)\myinstaller\is-NRC7J.tmp 628e54e02a93b_c820032.tmp File opened for modification C:\Program Files (x86)\myinstaller\unins000.dat 628e54e02a93b_c820032.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2336 1772 WerFault.exe 628e54e108f5b_e0c250f52b.exe 512 1796 WerFault.exe 628e54e90ed62_5334eb4d12.exe 3488 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 1208 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 2552 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 3544 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 3880 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 2620 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 4488 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe 3992 2396 WerFault.exe 628e54e5260e5_73b5a3dba.exe -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeregsvr32.exe628e54dc06ca5_d13f73d.exesetup_install.execmd.execmd.exe628e54e108f5b_e0c250f52b.exe628e54dd948c8_bdbfe0e55.exe628e54e02a93b_c820032.tmp628e54db139b7_3622eb547b.exepowershell.exe628e54e5260e5_73b5a3dba.exe628e54e02a93b_c820032.tmpsetup_installer.execmd.exe628e54e7eb628_9d99fab57f.exe628e54e3a0747_ed24a9c5da.exe628e54dd948c8_bdbfe0e55.exe628e54e02a93b_c820032.exe628e54e90ed62_5334eb4d12.exe628e54dc06ca5_d13f73d.exe628e54e7eb628_9d99fab57f.exe628e54e02a93b_c820032.execmd.execmd.execmd.exe628e54eb12f29_19a8386c8a.tmpcmd.execmd.execmd.exetaskkill.execmd.execmd.exe628e54eb12f29_19a8386c8a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54dc06ca5_d13f73d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e108f5b_e0c250f52b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54dd948c8_bdbfe0e55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e02a93b_c820032.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54db139b7_3622eb547b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e5260e5_73b5a3dba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e02a93b_c820032.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e7eb628_9d99fab57f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e3a0747_ed24a9c5da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54dd948c8_bdbfe0e55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e02a93b_c820032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e90ed62_5334eb4d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54dc06ca5_d13f73d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e7eb628_9d99fab57f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54e02a93b_c820032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54eb12f29_19a8386c8a.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628e54eb12f29_19a8386c8a.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
628e54e108f5b_e0c250f52b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 628e54e108f5b_e0c250f52b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 628e54e108f5b_e0c250f52b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 628e54e108f5b_e0c250f52b.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2044 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1476 powershell.exe 1476 powershell.exe 1476 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
628e54e5260e5_73b5a3dba.exepid process 2396 628e54e5260e5_73b5a3dba.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
628e54dc06ca5_d13f73d.exepowershell.exe628e54db139b7_3622eb547b.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3960 628e54dc06ca5_d13f73d.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 2648 628e54db139b7_3622eb547b.exe Token: SeDebugPrivilege 2044 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
628e54e02a93b_c820032.tmppid process 460 628e54e02a93b_c820032.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
628e54dd948c8_bdbfe0e55.exe628e54dd948c8_bdbfe0e55.exepid process 4336 628e54dd948c8_bdbfe0e55.exe 4336 628e54dd948c8_bdbfe0e55.exe 4344 628e54dd948c8_bdbfe0e55.exe 4344 628e54dd948c8_bdbfe0e55.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1064 wrote to memory of 1124 1064 setup_installer.exe setup_install.exe PID 1064 wrote to memory of 1124 1064 setup_installer.exe setup_install.exe PID 1064 wrote to memory of 1124 1064 setup_installer.exe setup_install.exe PID 1124 wrote to memory of 4068 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4068 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4068 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3740 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3740 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3740 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3320 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3320 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3320 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4936 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4936 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4936 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4560 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4560 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4560 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3756 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3756 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3756 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4364 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4364 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4364 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3884 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3884 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 3884 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 2716 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 2716 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 2716 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4060 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4060 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4060 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4764 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4764 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4764 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4492 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4492 1124 setup_install.exe cmd.exe PID 1124 wrote to memory of 4492 1124 setup_install.exe cmd.exe PID 3756 wrote to memory of 1772 3756 cmd.exe 628e54e108f5b_e0c250f52b.exe PID 3756 wrote to memory of 1772 3756 cmd.exe 628e54e108f5b_e0c250f52b.exe PID 3756 wrote to memory of 1772 3756 cmd.exe 628e54e108f5b_e0c250f52b.exe PID 3740 wrote to memory of 2648 3740 cmd.exe 628e54db139b7_3622eb547b.exe PID 3740 wrote to memory of 2648 3740 cmd.exe 628e54db139b7_3622eb547b.exe PID 3740 wrote to memory of 2648 3740 cmd.exe 628e54db139b7_3622eb547b.exe PID 4068 wrote to memory of 1476 4068 cmd.exe powershell.exe PID 4068 wrote to memory of 1476 4068 cmd.exe powershell.exe PID 4068 wrote to memory of 1476 4068 cmd.exe powershell.exe PID 4936 wrote to memory of 4336 4936 cmd.exe 628e54dd948c8_bdbfe0e55.exe PID 4936 wrote to memory of 4336 4936 cmd.exe 628e54dd948c8_bdbfe0e55.exe PID 4936 wrote to memory of 4336 4936 cmd.exe 628e54dd948c8_bdbfe0e55.exe PID 4364 wrote to memory of 392 4364 cmd.exe 628e54e3a0747_ed24a9c5da.exe PID 4364 wrote to memory of 392 4364 cmd.exe 628e54e3a0747_ed24a9c5da.exe PID 4364 wrote to memory of 392 4364 cmd.exe 628e54e3a0747_ed24a9c5da.exe PID 4764 wrote to memory of 1796 4764 cmd.exe 628e54e90ed62_5334eb4d12.exe PID 4764 wrote to memory of 1796 4764 cmd.exe 628e54e90ed62_5334eb4d12.exe PID 4764 wrote to memory of 1796 4764 cmd.exe 628e54e90ed62_5334eb4d12.exe PID 3884 wrote to memory of 2396 3884 cmd.exe 628e54e5260e5_73b5a3dba.exe PID 3884 wrote to memory of 2396 3884 cmd.exe 628e54e5260e5_73b5a3dba.exe PID 3884 wrote to memory of 2396 3884 cmd.exe 628e54e5260e5_73b5a3dba.exe PID 3320 wrote to memory of 3960 3320 cmd.exe 628e54dc06ca5_d13f73d.exe PID 3320 wrote to memory of 3960 3320 cmd.exe 628e54dc06ca5_d13f73d.exe PID 3320 wrote to memory of 3960 3320 cmd.exe 628e54dc06ca5_d13f73d.exe PID 4060 wrote to memory of 4464 4060 cmd.exe 628e54e7eb628_9d99fab57f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8248E997\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54db139b7_3622eb547b.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54db139b7_3622eb547b.exe628e54db139b7_3622eb547b.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54dc06ca5_d13f73d.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dc06ca5_d13f73d.exe628e54dc06ca5_d13f73d.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dc06ca5_d13f73d.exeC:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dc06ca5_d13f73d.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54dd948c8_bdbfe0e55.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dd948c8_bdbfe0e55.exe628e54dd948c8_bdbfe0e55.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dd948c8_bdbfe0e55.exe"C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54dd948c8_bdbfe0e55.exe" -h5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e02a93b_c820032.exe3⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e02a93b_c820032.exe628e54e02a93b_c820032.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\is-4F6QS.tmp\628e54e02a93b_c820032.tmp"C:\Users\Admin\AppData\Local\Temp\is-4F6QS.tmp\628e54e02a93b_c820032.tmp" /SL5="$60038,921146,831488,C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e02a93b_c820032.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e02a93b_c820032.exe"C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e02a93b_c820032.exe" /VERYSILENT6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\is-9EI3F.tmp\628e54e02a93b_c820032.tmp"C:\Users\Admin\AppData\Local\Temp\is-9EI3F.tmp\628e54e02a93b_c820032.tmp" /SL5="$30212,921146,831488,C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e02a93b_c820032.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:460
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e108f5b_e0c250f52b.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e108f5b_e0c250f52b.exe628e54e108f5b_e0c250f52b.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 3565⤵
- Program crash
PID:2336
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e3a0747_ed24a9c5da.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e3a0747_ed24a9c5da.exe628e54e3a0747_ed24a9c5da.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:392 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /U SL5G26.S -S5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2484
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e5260e5_73b5a3dba.exe /mixtwo3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e5260e5_73b5a3dba.exe628e54e5260e5_73b5a3dba.exe /mixtwo4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 4605⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 7725⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 7805⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 8245⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 8325⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 9925⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 10285⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 12845⤵
- Program crash
PID:3992
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e6a6a3b_9dab9e.exe3⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e6a6a3b_9dab9e.exe628e54e6a6a3b_9dab9e.exe4⤵
- Executes dropped EXE
PID:4452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e7eb628_9d99fab57f.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e7eb628_9d99fab57f.exe628e54e7eb628_9d99fab57f.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e7eb628_9d99fab57f.exe628e54e7eb628_9d99fab57f.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54e90ed62_5334eb4d12.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e90ed62_5334eb4d12.exe628e54e90ed62_5334eb4d12.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "628e54e90ed62_5334eb4d12.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54e90ed62_5334eb4d12.exe" & exit5⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "628e54e90ed62_5334eb4d12.exe" /f6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 13045⤵
- Program crash
PID:512
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 628e54eb12f29_19a8386c8a.exe3⤵
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54eb12f29_19a8386c8a.exe628e54eb12f29_19a8386c8a.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\is-23TGH.tmp\628e54eb12f29_19a8386c8a.tmp"C:\Users\Admin\AppData\Local\Temp\is-23TGH.tmp\628e54eb12f29_19a8386c8a.tmp" /SL5="$801CE,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS8248E997\628e54eb12f29_19a8386c8a.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2396 -ip 23961⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1772 -ip 17721⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1796 -ip 17961⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2396 -ip 23961⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2396 -ip 23961⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2396 -ip 23961⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2396 -ip 23961⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2396 -ip 23961⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2396 -ip 23961⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2396 -ip 23961⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD511bb40d70366b08049ba60475a966247
SHA1352319c07af069cd92c888053ef1a64da94afe3e
SHA25618a55f728ec409bc3ef9fcc2f3b12214d2b263530d3931bdc6dcc00681d8976d
SHA512d9ed46eef62503aa26b3947da1826fe01f719ce8521b118e78241f568eb927287385b38d1ba46fd5133f102a1bb963919e0a47d03e16a1c03b9f3a650f722b0d
-
Filesize
470KB
MD5021818706fc0edce007e288a2c236108
SHA147072ac86f0cb8165d7ac5eb129ba5ba0f6f3d2b
SHA256f6664bf6bd4eecb657d9bfcd055ef54730c66c8d440e7df37a4cf20554c168ee
SHA51277ccd9604a03a351d2a28d748aaaaa121f1d68b29d0eaecaea19651b003f97ce07862487ddb9ff9638429f60918b55004f4b6a30540281a4d95ecaa67ed3c3b2
-
Filesize
308KB
MD5c502751e146757341de931736af21225
SHA14e100575fd329b47d3b358bbf3313b8c656005fb
SHA25648fca3228e955b485282b19fffaaa7657cecf99518965701e5918ac65d556a01
SHA5124a51fcf4ca57996a7d6bbad782bac3596f6983b6ed3e26ac7fd838269abb9dff9c0d35edd95a278edde81c2ba88efb10d6d106e9d914029ecf0c459444d6080a
-
Filesize
1.7MB
MD543eaf2e2226cd28ba7142ddfdd47356e
SHA1410c2586b4b181976a93534deefe6d46aa58bfd1
SHA256a072b6112f5ea82e5914c1f3314aafc92b234f5a252eda19f889581adb4e6a65
SHA512ab27255598f6eefe30912f1278741975b4449a41691138ccba660200356ea74a8df7f88bc9d682582850bdd4340079f0e6cc92843f192f4a848eaae0fe4601e8
-
Filesize
277KB
MD53c7723d13222b4958456a20d311cc8c4
SHA1d31b6202a187f9718a6772c0895f43d71558da8c
SHA25651003ca2a3efcc8bd9d6f0e1a0570450da6382f2a9dc5642e2738c77eec9021e
SHA5125ba31d79c39e9053d95445305279aa728fa9921b4c8703a30bae3121000f1d37305869fa0a607495fd5cf8a71461315c9d29561f38b5a615a09d6a279feac288
-
Filesize
2.0MB
MD50b3797915ac9117308dbd3233bf2704e
SHA11b5ae1898b98ef37897c62cce18014ff004df48b
SHA256b994e608b7598669acb1a8b2a1bb38377db13866e2ae5f2176629996c70a3c57
SHA512051dd4a79e6b20f7fbb119415def8436e1d8d80c0ed77faa01b12c67ebbe99df868d5feeca475204a8789479de3795fe5e674e371d3e6b4d7c006cbf9224578f
-
Filesize
363KB
MD5bb56078ddaa0e5e1a98a0785c0ef766c
SHA1c42a1c57a5680a91a0958bad0181556149516daa
SHA256def799a3a3599ce27bacba2efce4460afc18d5d256dcc9988200a3399e3a44da
SHA51284fdbc5d496e854250b895cb9f71eac19d6c233d356222aadcf9c49c6c8ff3925f480b2e6599764e7e49746770d98e13a9491bf8dcdeb83157035dbc530886d9
-
Filesize
3.5MB
MD5aa361f61a27919a04dbc72eb8b0c1c56
SHA1e1be1931ce09e9273c5d00a1b64d24245c240d82
SHA256c7462edcc58099edbf6e4acc8e7e3b35e1bee5bb25b1ec535a56e8733f605854
SHA512b8ab02c92479f808b50e01ff1f1db5eb5f51277741f1a2623a33b7e8155f2b8cfec521853af316c9b838f6156bc231401cbde3c83a78071d56e3dde135052872
-
Filesize
277KB
MD5ac65f2c596bea94c9b50a39925efd184
SHA199266bed39b8888bb5454b433529641b441b0df4
SHA25605301420d5074271535fbd30b167031e32f537a2b9a623596f65583ccd61d99a
SHA512b424b2238197c51b72a5f06a4cf2117b30d83cd85ff31cc41c2c5f423b6bcd96b297c94145b0756a911a0acd31908fb1efd500bb13e5e23a09122618d66363fb
-
Filesize
319KB
MD524c5458c851184d7ea7f112380217a4f
SHA185d24abfd8060a3fc5d0a1701f173dcc531b4de5
SHA256a1e01f75a4409528927fb37d743e9ed794e7206fa6a8f9478d48257f15b31d8b
SHA512098dcd40271619191f8c0210dedbc120e4257f40c8d9ee39a0a0a4cf150b03a8d0e1fa8f2b7ae894371565cc70ad8266d45d3ea919abce22d85c7b4a82c89048
-
Filesize
752KB
MD5739240f8376ccdfed36beda76bcab764
SHA1be54ead2c06e3389743ac3356a2dfa936b43047b
SHA25609e474b529d4ae7a5052a55b2c6b4c1a86f82ffa9d0ec836d15f98962311cd3a
SHA512ab5c516fad6e2993ddba82e2e81f6f2a6376999297d86f66d27c61354e1b12874e3fd9b5b880a20dc48f3ec1c9d28b5e92e1b5acd5fcc8e76cbd500db549013b
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5f4390b2aa142600086e06d96c6c6d43d
SHA12c7707b4e4237a7870b1fadc3316b67f3ba0e16e
SHA25656e5578efb61f1624ddfd9f69ef677dfbd6b7e10e8dac20661c71b83ceebcb7d
SHA51287a2ae4162a4ac4f37a8a9db0289e444b030099a7cb8841cc018ddf067f2360b40ea1960d82731aa5a46e1cfb10724442c4115d8ff6b565f3ea827b97f2d0b6a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.0MB
MD5a5ea5f8ae934ab6efe216fc1e4d1b6dc
SHA1cb52a9e2aa2aa0e6e82fa44879055003a91207d7
SHA256be998499deb4ad2cbb87ff38e372f387baf4da3a15faf6d0a43c5cc137650d9e
SHA512f13280508fb43734809321f65741351aedd1613c3c989e978147dbb5a59efb02494349fbf6ee96b85de5ad049493d8382372993f3d54b80e84e36edf986e915c
-
Filesize
3.0MB
MD5892965cf131bc5a238d8c7a190718c80
SHA1dde8dde7d656a8ce413cb4cb8b6b46afe3a6eabb
SHA256724b85f1f97ebaa793f4e0bba29337657cd4393c04948cfae1ddc8613a3e319e
SHA512729996beead85b36acfe2172255559ef388c9a31303c3a1e4403be819d5c4b005e4cdae950ff04047d15f10fb8be8fb27f529a8c66bf29319e944068905a1954
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35