Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
a2059ca7715450dc171f7608325744da.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2059ca7715450dc171f7608325744da.exe
Resource
win10v2004-20240611-en
General
-
Target
a2059ca7715450dc171f7608325744da.exe
-
Size
45.0MB
-
MD5
a2059ca7715450dc171f7608325744da
-
SHA1
59f73376071e1e81471e8452db1c188340885a2f
-
SHA256
72ef598f8e69e142e21fef23cff48d2e9e49dcd142c12189656eab3269b454eb
-
SHA512
8c2ab1eb0e74a35883f35031c80c98ac63301b21350978d3d322aaf1fc9f02fa7f96cf1f824818f04a821c7f50029a8b9d7b423cf488fd9121dfa00cc0f2562b
-
SSDEEP
786432:m5/faR80BcXAYOuzNYe6NAApOAsExCWUs38wJ/YSGlWfzewb7wrSvMEBE25t:wfiBOAY3j6NB1h/3JJ/YSdfA+vMEBE2r
Malware Config
Extracted
redline
1
147.45.78.229:43674
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule \??\c:\programdata\1.exe family_redline -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule \Windows\Tasks\ApplicationsFrameHost.exe family_xmrig \Windows\Tasks\ApplicationsFrameHost.exe xmrig -
Possible privilege escalation attempt 13 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 1520 takeown.exe 2844 icacls.exe 472 icacls.exe 1492 icacls.exe 1564 takeown.exe 2268 icacls.exe 1404 icacls.exe 888 takeown.exe 580 icacls.exe 520 icacls.exe 2680 icacls.exe 2220 icacls.exe 2712 icacls.exe -
Executes dropped EXE 12 IoCs
Processes:
migrate.exeWmiic.exeWmiic.exeWmiic.exeIntelConfigService.exeWrap.exeApplicationsFrameHost.exeSuperfetch.exeMSTask.exeMSTask.exepid process 1088 migrate.exe 2352 Wmiic.exe 1192 2940 Wmiic.exe 464 2996 Wmiic.exe 1596 IntelConfigService.exe 2928 Wrap.exe 2968 ApplicationsFrameHost.exe 2780 Superfetch.exe 2500 MSTask.exe 1308 MSTask.exe -
Loads dropped DLL 28 IoCs
Processes:
cmd.execmd.exeWmiic.exeIntelConfigService.execmd.exeMSTask.exeMSTask.exepid process 1252 cmd.exe 1964 cmd.exe 1964 cmd.exe 3040 1964 cmd.exe 2036 2996 Wmiic.exe 1596 IntelConfigService.exe 2616 cmd.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 2500 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe 1308 MSTask.exe -
Modifies file permissions 1 TTPs 13 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2712 icacls.exe 1564 takeown.exe 1492 icacls.exe 2844 icacls.exe 2220 icacls.exe 888 takeown.exe 1520 takeown.exe 472 icacls.exe 1404 icacls.exe 580 icacls.exe 2680 icacls.exe 2268 icacls.exe 520 icacls.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Windows\Tasks\IntelConfigService.exe autoit_exe C:\Windows\Tasks\Superfetch.exe autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
MSTask.exedescription ioc process File created \??\c:\windows\system32\miners.txt7w70q5t8.tmp MSTask.exe File created \??\c:\windows\system32\v.txtttqqg138.tmp MSTask.exe -
Drops file in Windows directory 23 IoCs
Processes:
migrate.exeIntelConfigService.exeApplicationsFrameHost.exedescription ioc process File opened for modification C:\Windows\Tasks\MSTask.exe migrate.exe File opened for modification C:\Windows\Tasks\run.bat migrate.exe File opened for modification C:\Windows\Tasks\WinRing0x64.sys migrate.exe File created C:\Windows\Tasks\__tmp_rar_sfx_access_check_259453733 migrate.exe File created C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File created C:\Windows\Tasks\config.json migrate.exe File opened for modification C:\Windows\Tasks\config.json migrate.exe File opened for modification C:\Windows\Tasks\IntelConfigService.exe migrate.exe File opened for modification C:\Windows\Tasks\Wmiic.exe migrate.exe File created C:\Windows\Tasks\MicrosoftPrt.exe migrate.exe File opened for modification C:\Windows\Tasks IntelConfigService.exe File created C:\Windows\Tasks\IntelConfigService.exe migrate.exe File opened for modification C:\Windows\Tasks\Superfetch.exe migrate.exe File opened for modification C:\Windows\Tasks\MicrosoftPrt.exe migrate.exe File opened for modification C:\Windows\Tasks\config.json ApplicationsFrameHost.exe File opened for modification C:\Windows\Tasks\ApplicationsFrameHost.exe migrate.exe File created C:\Windows\Tasks\run.bat migrate.exe File created C:\Windows\Tasks\WinRing0x64.sys migrate.exe File created C:\Windows\Tasks\Wmiic.exe migrate.exe File created C:\Windows\Tasks\Wrap.exe migrate.exe File created C:\Windows\Tasks\MSTask.exe migrate.exe File created C:\Windows\Tasks\Superfetch.exe migrate.exe File opened for modification C:\Windows\Tasks\Wrap.exe migrate.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule C:\Windows\Tasks\MSTask.exe pyinstaller C:\Windows\Tasks\MicrosoftPrt.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1932 timeout.exe 872 timeout.exe 1728 timeout.exe 1032 timeout.exe 2360 timeout.exe 2120 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 568 taskkill.exe 316 taskkill.exe 2612 taskkill.exe 2532 taskkill.exe 2888 taskkill.exe 2900 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exeIntelConfigService.exepid process 2240 powershell.exe 2624 powershell.exe 2480 powershell.exe 744 powershell.exe 1380 powershell.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
powershell.exepowershell.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetakeown.exetasklist.exepowershell.exepowershell.exeApplicationsFrameHost.exedescription pid process Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2612 taskkill.exe Token: SeDebugPrivilege 2532 taskkill.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 568 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeTakeOwnershipPrivilege 1520 takeown.exe Token: SeDebugPrivilege 2184 tasklist.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeLockMemoryPrivilege 2968 ApplicationsFrameHost.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
IntelConfigService.exeApplicationsFrameHost.exeSuperfetch.exepid process 1596 IntelConfigService.exe 1596 IntelConfigService.exe 1596 IntelConfigService.exe 2968 ApplicationsFrameHost.exe 2780 Superfetch.exe 2780 Superfetch.exe 2780 Superfetch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a2059ca7715450dc171f7608325744da.exepowershell.exenet.execmd.execmd.exedescription pid process target process PID 1916 wrote to memory of 2240 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2240 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2240 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2240 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2624 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2624 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2624 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2624 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2480 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2480 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2480 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 1916 wrote to memory of 2480 1916 a2059ca7715450dc171f7608325744da.exe powershell.exe PID 2480 wrote to memory of 2500 2480 powershell.exe net.exe PID 2480 wrote to memory of 2500 2480 powershell.exe net.exe PID 2480 wrote to memory of 2500 2480 powershell.exe net.exe PID 2480 wrote to memory of 2500 2480 powershell.exe net.exe PID 2500 wrote to memory of 2920 2500 net.exe net1.exe PID 2500 wrote to memory of 2920 2500 net.exe net1.exe PID 2500 wrote to memory of 2920 2500 net.exe net1.exe PID 2500 wrote to memory of 2920 2500 net.exe net1.exe PID 2480 wrote to memory of 2612 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2612 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2612 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2612 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2532 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2532 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2532 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2532 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2888 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2888 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2888 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2888 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2900 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2900 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2900 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 2900 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 568 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 568 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 568 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 568 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 316 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 316 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 316 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 316 2480 powershell.exe taskkill.exe PID 2480 wrote to memory of 820 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 820 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 820 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 820 2480 powershell.exe cmd.exe PID 820 wrote to memory of 888 820 cmd.exe takeown.exe PID 820 wrote to memory of 888 820 cmd.exe takeown.exe PID 820 wrote to memory of 888 820 cmd.exe takeown.exe PID 820 wrote to memory of 888 820 cmd.exe takeown.exe PID 2480 wrote to memory of 1700 2480 powershell.exe schtasks.exe PID 2480 wrote to memory of 1700 2480 powershell.exe schtasks.exe PID 2480 wrote to memory of 1700 2480 powershell.exe schtasks.exe PID 2480 wrote to memory of 1700 2480 powershell.exe schtasks.exe PID 2480 wrote to memory of 1852 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 1852 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 1852 2480 powershell.exe cmd.exe PID 2480 wrote to memory of 1852 2480 powershell.exe cmd.exe PID 1852 wrote to memory of 1520 1852 cmd.exe takeown.exe PID 1852 wrote to memory of 1520 1852 cmd.exe takeown.exe PID 1852 wrote to memory of 1520 1852 cmd.exe takeown.exe PID 1852 wrote to memory of 1520 1852 cmd.exe takeown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2059ca7715450dc171f7608325744da.exe"C:\Users\Admin\AppData\Local\Temp\a2059ca7715450dc171f7608325744da.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $True2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath c:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" stop wmservice3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wmservice4⤵
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im migrate.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im IntelConfigService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im MSTask.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im Superfetch.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im Wmiic.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im Wrap.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c takeown /F c:\windows\tasks3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /F c:\windows\tasks4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn WindowsUpdate /F3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c takeown /F C:\ProgramData\migrate.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /F C:\ProgramData\migrate.exe4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /F /Q C:\ProgramData\migrate.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\programdata\ru.bat" "2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "c:\programdata\st.bat"3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq Superfetch.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "Superfetch.exe"4⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f c:\windows\tasks4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $True4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -ExclusionPath c:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "Admin:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
\??\c:\programdata\migrate.exec:\programdata\migrate.exe -p44324⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\tasks\run.bat" "5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic.exe" install WMService IntelConfigService.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exe"C:\windows\tasks\wmiic" start WMService6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 2 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\net.exenet start WMService6⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start WMService7⤵
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\windows\tasks\Wmiic.exeC:\windows\tasks\Wmiic.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\windows\tasks\IntelConfigService.exe"IntelConfigService.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\Wrap.exeC:\Windows\Tasks\Wrap.exe3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\Tasks\ApplicationsFrameHost.exe" --daemonized4⤵
- Loads dropped DLL
-
C:\Windows\Tasks\ApplicationsFrameHost.exeC:\Windows\Tasks\ApplicationsFrameHost.exe --daemonized5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "%username%:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "EILATWEW$:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Users:(R,REA,RA,RD)"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"3⤵
-
C:\Windows\system32\icacls.exeicacls C:\Windows\Tasks /deny "Administrators:(R,REA,RA,RD))"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\Tasks\Superfetch.exeC:\Windows\Tasks\Superfetch.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\Tasks\MSTask.exeC:\Windows\Tasks\MSTask.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Tasks\MSTask.exeC:\Windows\Tasks\MSTask.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ru.batFilesize
32B
MD511e08b5abf3f1675f99c96f78c128b23
SHA140d6dd08262ef959328aec4dc5ed07532232037c
SHA25650ac09332ff9d6521244b4f9cf6fd9cc489b3324ed1316e07f6a5904230397e7
SHA5123005767016b4c5da031fb2ac5288b01821d54768b5e099e1157d4fa4621a078d589e54d9c5c89ded58ac3ca94395dacbf1d840f9210f909d3c9dfe8092de8ff9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5f13755b5fa17ff7bbca642c921cd4d67
SHA13064dc7c90526bbac9b26d47e52ab1fb29e2d744
SHA25666172944d220cf42c09322d10cdd10e9c18b387678357a78478f1bd6a2492eba
SHA512d589f4a8b4c8759c07d7a4f91720b814d47b90bedfb131db5551fcf5967be5ee9214057a4df5450aab174d09ae7563ba9ff29883d3845d2ce73162fc56f22cb1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5c86d542112eec7054867a24cffb3c797
SHA1ae1bb5b2e6eaa9a11ca285d85c7f2529290bef9d
SHA2563cdc87d7901be4152cdc465385b5d6075a76cb168013268c595f5f585b74cae9
SHA512efdb5897ec20bdb27b68928210f1283384201c238f87cb8d2e89dd955e592f8445a3ba6dd0f727fde8a05ed4d96a022e4b5504e070dcde915115e710c00e393e
-
C:\Windows\TEMP\_MEI25002\VCRUNTIME140.dllFilesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
C:\Windows\TEMP\_MEI25002\_bz2.pydFilesize
82KB
MD53dc8af67e6ee06af9eec52fe985a7633
SHA11451b8c598348a0c0e50afc0ec91513c46fe3af6
SHA256c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929
SHA512da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087
-
C:\Windows\TEMP\_MEI25002\_cffi_backend.cp38-win_amd64.pydFilesize
177KB
MD577b5d28b725596b08d4393786d98bd27
SHA1e3f00478de1d28bc7d2e9f0b552778be3e32d43b
SHA256f7a00ba343d6f1ea8997d95b242fbbd70856ec2b98677d5f8b52921b8658369c
SHA512d44415d425f7423c3d68df22b72687a2d0da52966952e20d215553aa83de1e7a5192ec918a3d570d6c2362eb5500b56b87e3ffbc0b768bfa064585aea2a30e9d
-
C:\Windows\TEMP\_MEI25002\_hashlib.pydFilesize
44KB
MD5a6448bc5e5da21a222de164823add45c
SHA16c26eb949d7eb97d19e42559b2e3713d7629f2f9
SHA2563692fc8e70e6e29910032240080fc8109248ce9a996f0a70d69acf1542fca69a
SHA512a3833c7e1cf0e4d181ac4de95c5dfa685cf528dc39010bf0ac82864953106213eccff70785021ccb05395b5cf0dcb89404394327cd7e69f820d14dfa6fba8cba
-
C:\Windows\TEMP\_MEI25002\_lzma.pydFilesize
246KB
MD537057c92f50391d0751f2c1d7ad25b02
SHA1a43c6835b11621663fa251da421be58d143d2afb
SHA2569442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764
SHA512953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c
-
C:\Windows\TEMP\_MEI25002\_queue.pydFilesize
27KB
MD544b72e0ad8d1e1ec3d8722088b48c3c5
SHA1e0f41bf85978dd8f5abb0112c26322b72c0d7770
SHA2564aa1bbde1621c49edab4376cf9a13c1aa00a9b0a9905d9640a2694ef92f77d5e
SHA51205853f93c6d79d8f9c96519ce4c195b9204df1255b01329deaa65e29bd3e988d41454cd305e2199404f587e855737879c330638f2f07bff11388a49e67ba896c
-
C:\Windows\TEMP\_MEI25002\_socket.pydFilesize
77KB
MD5d6bae4b430f349ab42553dc738699f0e
SHA17e5efc958e189c117eccef39ec16ebf00e7645a9
SHA256587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef
SHA512a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e
-
C:\Windows\TEMP\_MEI25002\base_library.zipFilesize
821KB
MD5e187fce3f6d3f4ba450630147421a885
SHA118241f2097f7d53cfb6b118fae1f9cd31d169d07
SHA2561f908e12fba42af4ad0ade6fa7f1dbc617afe7837271911056af266d895e596a
SHA5127837a3b28993422d067643efe17c5f573dbd4c4b3e6d915e691e7557c259146a3fddb104da5306b63be59a81446d1dfea5317b5e62cbce6a5aaa8dc700b42874
-
C:\Windows\TEMP\_MEI25002\libcrypto-1_1.dllFilesize
3.2MB
MD5bf83f8ad60cb9db462ce62c73208a30d
SHA1f1bc7dbc1e5b00426a51878719196d78981674c4
SHA256012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d
SHA512ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e
-
C:\Windows\TEMP\_MEI25002\libssl-1_1.dllFilesize
670KB
MD5fe1f3632af98e7b7a2799e3973ba03cf
SHA1353c7382e2de3ccdd2a4911e9e158e7c78648496
SHA2561ce7ba99e817c1c2d71bc88a1bdd6fcad82aa5c3e519b91ebd56c96f22e3543b
SHA512a0123dfe324d3ebf68a44afafca7c6f33d918716f29b063c72c4a8bd2006b81faea6848f4f2423778d57296d7bf4f99a3638fc87b37520f0dcbeefa3a2343de0
-
C:\Windows\TEMP\_MEI25002\python3.dllFilesize
57KB
MD57acec875d5672e7aa148b8c40df9aa49
SHA196b8cfabe0cfa3df32995919ac77cfdeec26f1f2
SHA256d96858e433f45917499dbf5e052e56f079ff9ae259fd3caa025c3b1daf852891
SHA5121208da62fe82b779ec822ad702f9ca4321b34ee590c28e10efe9a2db6d582bfdcae01ab2431c1a98714ef0c60434d64c58f3db31bf5886efbb943adc70d6e975
-
C:\Windows\TEMP\_MEI25002\python38.dllFilesize
4.0MB
MD5d2a8a5e7380d5f4716016777818a32c5
SHA1fb12f31d1d0758fe3e056875461186056121ed0c
SHA25659ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7
-
C:\Windows\TEMP\_MEI25002\select.pydFilesize
26KB
MD56ae54d103866aad6f58e119d27552131
SHA1bc53a92a7667fd922ce29e98dfcf5f08f798a3d2
SHA25663b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88
SHA512ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0
-
C:\Windows\TEMP\_MEI25002\unicodedata.pydFilesize
1.0MB
MD54c0d43f1a31e76255cb592bb616683e7
SHA10a9f3d77a6e064baebacacc780701117f09169ad
SHA2560f84e9f0d0bf44d10527a9816fcab495e3d797b09e7bbd1e6bd666ceb4b6c1a8
SHA512b8176a180a441fe402e86f055aa5503356e7f49e984d70ab1060dee4f5f17fcec9c01f75bbff75ce5f4ef212677a6525804be53646cc0d7817b6ed5fd83fd778
-
C:\Windows\Tasks\MSTask.exeFilesize
8.5MB
MD592a9c0ef09f955f9f1bca837d7aa493f
SHA19292e187f09c271393be635220a75b11c03c469d
SHA25695c101a0164af189cc282eb2d67e143b42e6d57d7ef396d59715a355a3162b96
SHA512c906db5cec598254d5584040b02dfb7b813b94d63af6af90f3ab7014a89409677d6ca78d4f544b3415058c09ba6c972e7cf8da4b1aa04f954a4689b4a70cbf3f
-
C:\Windows\Tasks\MicrosoftPrt.exeFilesize
32.6MB
MD502484a615e581a9a431e20df300faed4
SHA1d855e2c9338b1508577b3e831cc89838c2768647
SHA25616d2f6194d1b1989fbef4572055dbf62a0d6a2570b316ac15722192f1c559a50
SHA5127b69e3e47863ec7edfa03fa1f25a15c90ee84aec520ff08d8834b010eb58532f444daa81056b3dcc7d77f42eb0f390b8490cb59a705fa24b6674a088d796fe57
-
C:\Windows\Tasks\Superfetch.exeFilesize
1.6MB
MD5362ffce5c7c480702a615f1847191f62
SHA175aceaea1dfba0735212c2ab5cafc49257927f73
SHA2569e24c7b4604aa3022325b62154ac80dc76533fa96a3418d8e15d28c998fb9c53
SHA5129a71825a4e111c89e193f799f5cd0f38bf753137bf669040254eb5ecfbeb1e7fb161451320592832381b6ae7a95b015ef8e9192ab10ad41e113bad35dde7d15f
-
C:\Windows\Tasks\WinRing0x64.sysFilesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Windows\Tasks\Wrap.exeFilesize
362KB
MD539adb356036e91008843b83efb61131d
SHA159a38a196a2aa4c90100b1b8cc806e5582e0d4de
SHA2561cf2bdb1cdd34bb50d60f21b8208041913747b8deca5f26aa187d2e8c0e9a105
SHA512e606b15ee26d78b16851ec955a6c80759919937ab19c9b7b69d52747d0170524ee595f7ff15d881a412b45865e92439da9f3e5dceee004529bbf186a8510264a
-
C:\Windows\Tasks\config.jsonFilesize
3KB
MD5059e303d9b3cfc5c3fdb9165e0868d2c
SHA14e2996981ce135afd309d1b107045b98f20193e3
SHA256b11f0b3ab14221942f68f0393102520c05a5316e56bba63d6e9cd92b0ffbb4f2
SHA5121d4ba2a23fc6b8e8f261a900d0ff56c00bac5ad7272ef2ed9d87640eef3550eaa03c401e1c761dc31da8a3b3062f526b9cd7d5b528404290775f9020de154c1a
-
C:\Windows\Tasks\run.batFilesize
566B
MD5ec04f50bc9bccb2484db435653f949e7
SHA19a898ab38e980caa44504ebb400ee01ce2d46a3f
SHA256806a3fedd93ad066f918e6edda5a464fd4c13390501bba9bef8c7e2f0d6b8ba4
SHA512c6e98899eb2d2fdae8e67c0f63de4c9a3bd956343909f07063f128fb6ff488855045f4e7feb3ade6d5e76eb1a59d0f22e4213457717a70616a41bfc5544583da
-
\??\c:\programdata\1.exeFilesize
297KB
MD5809bd9b203cf2ea6fe29d7074ae1c246
SHA11efd4ba7ac8c7317f4d01e409a580dc02ced6306
SHA256663bc369d3051824e2b2f9e05accb8e9e4be86afc59d5b2aa26a3a5ee150370a
SHA5126bc93e02e192ab03c448bf7a982fc5af0a1a5df5e2bd9cacdebb9279119845f43ddc68011194c7317021f75ad37ba7c1603c77af09bdfe2febfbaca0fffe8249
-
\??\c:\programdata\st.batFilesize
1KB
MD54050181042859e45ecfa6f224afa79df
SHA1e72c9c8ba589b42a82792d8f7e794b79d8e831e3
SHA2569df0ff284989b10162cffb51d9873c6743ffb83f6d7c4b869a8193e6d6ac63e9
SHA512de2740437a431403ac89577f1f570a78269f0f24c58b531e7522542e60a668d7da355be3a126ac2fc4472282c0b06d8b217ec62f04ed5e6aab0ba9c8d27c54ce
-
\ProgramData\migrate.exeFilesize
44.6MB
MD5e75a9f4cbcdd27b2537920d6fd9bd551
SHA1cef1e0f896fc58679bdfb87ba11dc69a1e4948e6
SHA256c180ab1760e2da0a10de0672901f86d3a0e690b37bfb17f1d7eeaced8faa145d
SHA5127915bef2c04c865a3f3fc24f49472d27c7be11894ff86a277b8acaabe2f283f9981bf9bb4959e67c0f7fcfd244b47ec2cf56810f0d1d2f68de995fa5abf32337
-
\Windows\Tasks\ApplicationsFrameHost.exeFilesize
5.5MB
MD593ceef4357070a8ddc0beac173547ec1
SHA11e9bf45a790b5a818730de750dc6e2ffe6c35f7c
SHA2564d084a7e0c656d038d3176e97a4f807d094ce78f6b1f92a6ada7b93cf6a7cf03
SHA512611c22d55f2830f0556170144d6e0be64cf5bbd6ebe80323cf2944fe8860c9babac9439bff75626e10499b012c178feae3d80fe9939fec402115c3f184825cf6
-
\Windows\Tasks\IntelConfigService.exeFilesize
1.8MB
MD558e4115267b276452edc1f541e3a8198
SHA1ec40b6cce5c9a835563c17da81997e8010ac9cad
SHA256713120bac7807f6fc0a6050135556c0614a66be2fb476cfe163877f3d03b4d08
SHA5123def4b7f7fbeab01826eb733174bca64860f8bfbad3baec361b65b07b4558e28830fcc2deb264622199f9474277f04e562830bc5f0bf8a0e7932d002f1a812c5
-
\Windows\Tasks\Wmiic.exeFilesize
365KB
MD5a18bfe142f059fdb5c041a310339d4fd
SHA18ab2b0ddc897603344de8f1d4cc01af118a0c543
SHA256644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768
SHA512c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8
-
\Windows\Temp\_MEI25002\_ctypes.pydFilesize
120KB
MD5f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA123c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA2569459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5
-
\Windows\Temp\_MEI25002\libffi-7.dllFilesize
32KB
MD54424baf6ed5340df85482fa82b857b03
SHA1181b641bf21c810a486f855864cd4b8967c24c44
SHA2568c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA5128adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33
-
memory/2968-113-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB