Source: C:\Windows\System32\msiexec.exe | File opened: z: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: x: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: v: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: t: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: r: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: p: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: n: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: l: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: j: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: h: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: f: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: b: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: y: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: w: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: u: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: s: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: q: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: o: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: m: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: k: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: i: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: g: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: e: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: c: | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | File opened: a: | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then test dword ptr [esi+08h], 00000080h | 3_2_00831416 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov edx, dword ptr [esi] | 3_2_00831416 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, dword ptr [edx+013BEC98h] | 3_2_007C6628 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, dword ptr [edx+013BEC34h] | 3_2_007C6628 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push eax | 3_2_00831FC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push 00008000h | 3_2_008248A0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 0082318Bh | 3_2_008230E5 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+10h] | 3_2_008244F0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, 7Ah | 3_2_0082B818 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then sub eax, 20h | 3_2_0082B818 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp eax, 7Ah | 3_2_0082B818 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then sub eax, 20h | 3_2_0082B818 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ecx, 00000005h | 3_2_0082F43A |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then add edi, 04h | 3_2_007C6167 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+14h] | 3_2_008319A0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov ebx, dword ptr [edx+00000340h] | 3_2_00834DAE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov eax, dword ptr [ebp-08h] | 3_2_00823DBE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp edx, dword ptr [esi+000012F3h] | 3_2_00823DBE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then cmp ecx, dword ptr [esi+000012E3h] | 3_2_00823DBE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov eax, esi | 3_2_00823DBE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov edx, dword ptr [ebp+08h] | 3_2_00823DBE |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+14h] | 3_2_00831923 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then add edi, 04h | 3_2_007C61D7 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov edx, dword ptr [ebp+08h] | 3_2_00824139 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov eax, dword ptr [ebp+10h] | 3_2_00824574 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+20h] | 3_2_00824688 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 00822F7Ah | 3_2_00822EC3 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov eax, dword ptr [ebp-08h] | 3_2_00823EFC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then mov edx, dword ptr [ebp+08h] | 3_2_00823EFC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+20h] | 3_2_0082460B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then push dword ptr [ebp+1Ch] | 3_2_00824218 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 4x nop then jmp 008232DBh | 3_2_00823234 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: abd1 .exe, 00000003.00000003.261340368.000000000097A000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: abd1 .exe, 00000003.00000000.246395172.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: abd1 .exe, 00000003.00000000.246395172.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://stats.itopvpn.com/iusage.php |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: abd1 .exe, 00000003.00000002.509813241.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, abd1 .exe, 0000000D.00000002.356488267.0000000002450000.00000004.00001000.00020000.00000000.sdmp, abd1 .exe, 0000000D.00000002.365405919.000000006A90D000.00000040.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/ |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/)B3 |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/SS |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000999000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php$ |
Source: abd1 .exe, 00000003.00000002.512897795.0000000006251000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php... |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php1gW |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000999000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php25 |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000922000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php4 |
Source: abd1 .exe, 0000000D.00000002.348957842.00000000008D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php; |
Source: abd1 .exe, 00000003.00000002.506807500.000000000098B000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000003.319331406.0000000000989000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpC: |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpE |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000999000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpF |
Source: abd1 .exe, 00000003.00000002.506807500.00000000008F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpMm |
Source: abd1 .exe, 0000000D.00000002.348957842.00000000008D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpTR |
Source: abd1 .exe, 0000000D.00000002.348957842.00000000008D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpWO |
Source: abd1 .exe, 00000003.00000002.512897795.0000000006251000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpX% |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpb$f |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000940000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpimagens/bo/inspecionando.php8 |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000940000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpj |
Source: abd1 .exe, 00000003.00000002.506807500.00000000008F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpom |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phporC: |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000999000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpphG |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000999000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpq |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000922000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.php8 |
Source: abd1 .exe, 00000003.00000002.506807500.0000000000907000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phptCache |
Source: abd1 .exe, 00000003.00000002.506807500.0000000000907000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phptCookies |
Source: abd1 .exe, 0000000D.00000002.347804013.0000000000196000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLL |
Source: abd1 .exe, 00000003.00000002.506807500.00000000008F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpxm |
Source: abd1 .exe, 0000000D.00000002.348957842.000000000090E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: abd1 .exe, 00000003.00000002.506807500.000000000093D000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000003.319331406.0000000000922000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.comt |
Source: abd1 .exe.1.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 Author: unknown |
Source: 00000003.00000002.517143988.000000006C729000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 0000000D.00000002.350190121.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 Author: unknown |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 Author: unknown |
Source: 00000003.00000002.505703750.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 Author: unknown |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 13.2.abd1 .exe.6a500000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = c91f97a7e609d8138f8c5c7dd66cf675b1b3762f26baa5bf983ee212011b99cb, id = d4b38e13-1439-4549-ba90-0b4a8ed57fb3, last_modified = 2022-04-12 |
Source: 00000003.00000002.517143988.000000006C729000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 0000000D.00000002.350190121.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Generic_a160ca52 reference_sample = 650bf19e73ac2d9ebbf62f15eeb603c2b4a6a65432c70b87edc429165d6706f3, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Generic, fingerprint = 06eca9064ca27784b61994844850f05c47c07ba6c4242a2572d6d0c484a920f0, id = a160ca52-8911-4649-a1fa-ac8f6f75e18d, last_modified = 2022-04-12 |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: 0000000D.00000002.407213851.000000006C720000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_d4b38e13 reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = c91f97a7e609d8138f8c5c7dd66cf675b1b3762f26baa5bf983ee212011b99cb, id = d4b38e13-1439-4549-ba90-0b4a8ed57fb3, last_modified = 2022-04-12 |
Source: 00000003.00000002.505703750.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_a7da40b7 reference_sample = 2fb7241ffdfa7525f125e6d7b18e895cfb512ebb6905d056dbe7d76e8d6df806, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 62a62ede10d977582329b3daaa80b0b64576add77736135bac97d3a3eb6de558, id = a7da40b7-63cc-4456-a592-0485932092d5, last_modified = 2022-04-12 |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\f_4_T_u_r_4_34536_45645_3345_wo.msi" | |
Source: unknown | Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 715EC454D0BEADF2C26248DD1CAED610 | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\abd1 .exe C:\Users\user\AppData\Roaming\abd1 .exe | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\abd1 .exe "C:\Users\user\AppData\Roaming\abd1 .exe" | |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 715EC454D0BEADF2C26248DD1CAED610 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process created: C:\Users\user\AppData\Roaming\abd1 .exe C:\Users\user\AppData\Roaming\abd1 .exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02345477 push ebx; retf | 3_3_0234547C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02347E6A push ecx; retf | 3_3_02347E6B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02348CEF push eax; retf | 3_3_02348CFC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02346AC3 push fs; iretd | 3_3_02346AD5 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_0234533B push ebx; iretd | 3_3_0234533C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02345B22 push 00000048h; ret | 3_3_02345B2C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_0234872F push eax; retf | 3_3_0234873C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_023489AF push eax; retf | 3_3_023489BC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_3_02347FD1 push cs; iretd | 3_3_02347FD4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C007C push FFFFFFA2h; iretd | 3_2_007C007E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C2462 push ebx; ret | 3_2_007C246C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C3055 push eax; retf | 3_2_007C305C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C395D pushfd ; iretd | 3_2_007C3960 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C1917 push ebx; retf | 3_2_007C191C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_007C2765 push edi; retf | 3_2_007C276E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 13_3_0258F2E8 push ss; retf | 13_3_0258F2F2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 13_3_0258F2BA push ss; retf | 13_3_0258F2F2 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 4A3E60 value: E9 FB 65 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 4A397C value: E9 FB 68 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 49FCC0 value: E9 0B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 49FCE4 value: E9 6B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 49FCF4 value: E9 FF E8 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 796 base: 49FCB0 value: E9 B7 EA 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 4A3E60 value: E9 FB 65 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 4A397C value: E9 FB 68 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 49FCC0 value: E9 0B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 49FCE4 value: E9 6B E7 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 49FCF4 value: E9 FF E8 06 00 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Memory written: PID: 2904 base: 49FCB0 value: E9 B7 EA 06 00 | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: abd1 .exe, 0000000D.00000002.348957842.00000000008D7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9wNj |
Source: abd1 .exe, 00000003.00000003.319331406.0000000000940000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.506807500.000000000092E000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000003.319331406.0000000000922000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: abd1 .exe, 00000003.00000002.506807500.00000000008FD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWH |
Source: abd1 .exe, 00000003.00000002.515353721.0000000006B6A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGERq |
Source: abd1 .exe, 00000003.00000002.515353721.0000000006B6A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER1 |
Source: abd1 .exe, 00000003.00000002.515353721.0000000006B6A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGERa |
Source: abd1 .exe, 00000003.00000002.515353721.0000000006B6A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROGRAM MANAGER |
Source: abd1 .exe, 00000003.00000002.509813241.0000000002438000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Manager@ |
Source: abd1 .exe, 00000003.00000000.246395172.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | Binary or memory string: ProgmanU |