Analysis
-
max time kernel
33s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
16-08-2020 18:09
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
1.exe
Resource
win10
General
-
Target
1.exe
-
Size
12.5MB
-
MD5
af8e86c5d4198549f6375df9378f983c
-
SHA1
7ab5ed449b891bd4899fba62d027a2cc26a05e6f
-
SHA256
7570a7a6830ade05dcf862d5862f12f12445dbd3c0ad7433d90872849e11c267
-
SHA512
137f5a281aa15802e300872fdf93b9ee014d2077c29d30e5a029664eb0991af2afbe1e5c53a9d7bff8f0508393a8b7641c5a97b4b0e0061befb79a93506c94e1
Malware Config
Extracted
formbook
4.0
http://www.worstig.com/w9z/
crazzysex.com
hanferd.com
gteesrd.com
bayfrontbabyplace.com
jicuiquan.net
relationshiplink.net
ohchacyberphoto.com
kauegimenes.com
powerful-seldom.com
ketotoken.com
make-money-online-success.com
redgoldcollection.com
hannan-football.com
hamptondc.com
vllii.com
aa8520.com
platform35markethall.com
larozeimmo.com
oligopoly.net
llhak.info
fisioservice.com
tesla-magnumopus.com
cocodrilodigital.com
pinegrovesg.com
traveladventureswithme.com
hebitaixin.com
golphysi.com
gayjeans.com
quickhire.expert
randomviews1.com
eatatnobu.com
topmabati.com
mediaupside.com
spillerakademi.com
thebowtie.store
sensomaticloadcell.com
turismodemadrid.net
yuhe89.com
wernerkrug.com
cdpogo.net
dannynhois.com
realestatestructureddata.com
matewhereareyou.net
laimeibei.ltd
sw328.com
lmwworks.net
xtremefish.com
tonerias.com
dsooneclinicianexpert.com
281clara.com
smmcommunity.net
dreamneeds.info
twocraft.com
yasasiite.salon
advk8qi.top
drabist.com
europartnersplus.com
saltbgone.com
teslaoceanic.info
bestmedicationstore.com
buynewcartab.live
prospect.money
viebrocks.com
transportationhappy.com
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
resource yara_rule behavioral2/memory/1468-91-0x00000000057C0000-0x00000000057C2000-memory.dmp coreentity -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Formbook Payload 3 IoCs
resource yara_rule behavioral2/memory/2992-15-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/2992-17-0x000000000041E2D0-mapping.dmp formbook behavioral2/memory/576-51-0x0000000000000000-mapping.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral2/memory/1468-93-0x0000000008C80000-0x0000000008CD3000-memory.dmp rezer0 -
Executes dropped EXE 16 IoCs
pid Process 1908 2.exe 3292 3.exe 3208 4.exe 2992 2.exe 3172 5.exe 3888 6.exe 652 7.exe 1060 8.exe 1468 9.exe 1928 10.exe 2776 11.exe 616 12.exe 1644 13.exe 2788 14.exe 2828 15.exe 1768 16.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11.exe -
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 3.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16.exe 16.exe -
Loads dropped DLL 1 IoCs
pid Process 424 3.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1060-58-0x0000000002B90000-0x0000000002B9F000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeed = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\feeed.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Dokumen4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dibromob\\PRECONCE.vbs" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16.exe = "C:\\Windows\\System32\\16.exe" 16.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2066881839-3229799743-3576549721-1000\desktop.ini 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 16.exe File opened for modification C:\Program Files\desktop.ini 16.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 11.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\16.exe 16.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3292 3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1908 set thread context of 2992 1908 2.exe 75 PID 2992 set thread context of 2972 2992 2.exe 56 PID 3292 set thread context of 424 3292 3.exe 94 PID 576 set thread context of 2972 576 mstsc.exe 56 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-awt.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-spi-quicksearch.xml 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-loaders.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RELEASE-NOTES.html 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-settings.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\IpsMigrationPlugin.dll 16.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7zG.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdaosp.dll 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\leftnav.gif 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-nodes.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423496939244.profile.gz 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 16.exe File created C:\Program Files\7-Zip\7z.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee100.tlb 16.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\eclipse_update_120.jpg.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll 16.exe File opened for modification C:\Program Files\DenySync.potm 16.exe File created C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCallbacks.h.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-javahelp.xml 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-actions.xml 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-windows.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-execution.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-search.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-templates.xml 16.exe File created C:\Program Files\7-Zip\Lang\mk.txt.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7z.exe.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-startup.xml.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-explorer.xml 16.exe File opened for modification C:\Program Files\Common Files\System\wab32res.dll 16.exe File opened for modification C:\Program Files\EnterSync.sys.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\day-of-week-16.png.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html.id-F04CC412.[[email protected]].BOMBO 16.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ucrtbase.dll.id-F04CC412.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig-office.xrm-ms 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\booklist.gif 16.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css 16.exe File created C:\Program Files\7-Zip\Lang\gu.txt.id-F04CC412.[[email protected]].BOMBO 16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1908 2.exe 1908 2.exe 2992 2.exe 2992 2.exe 2992 2.exe 2992 2.exe 1060 8.exe 576 mstsc.exe 576 mstsc.exe 576 mstsc.exe 576 mstsc.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1060 8.exe 1768 16.exe 1768 16.exe 1768 16.exe 1768 16.exe 1768 16.exe 1768 16.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1908 2.exe 2992 2.exe 2992 2.exe 2992 2.exe 576 mstsc.exe 3292 3.exe 576 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2992 2.exe Token: SeDebugPrivilege 3172 5.exe Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeDebugPrivilege 1060 8.exe Token: SeDebugPrivilege 576 mstsc.exe Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 Explorer.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2972 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3292 3.exe 3172 5.exe 652 7.exe 1644 13.exe 2828 15.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3856 3588 1.exe 67 PID 3588 wrote to memory of 3856 3588 1.exe 67 PID 3856 wrote to memory of 3916 3856 cmd.exe 70 PID 3856 wrote to memory of 3916 3856 cmd.exe 70 PID 3856 wrote to memory of 1908 3856 cmd.exe 71 PID 3856 wrote to memory of 1908 3856 cmd.exe 71 PID 3856 wrote to memory of 1908 3856 cmd.exe 71 PID 3856 wrote to memory of 3292 3856 cmd.exe 72 PID 3856 wrote to memory of 3292 3856 cmd.exe 72 PID 3856 wrote to memory of 3292 3856 cmd.exe 72 PID 3856 wrote to memory of 3208 3856 cmd.exe 73 PID 3856 wrote to memory of 3208 3856 cmd.exe 73 PID 3856 wrote to memory of 3208 3856 cmd.exe 73 PID 1908 wrote to memory of 2992 1908 2.exe 75 PID 1908 wrote to memory of 2992 1908 2.exe 75 PID 1908 wrote to memory of 2992 1908 2.exe 75 PID 3856 wrote to memory of 3172 3856 cmd.exe 76 PID 3856 wrote to memory of 3172 3856 cmd.exe 76 PID 3856 wrote to memory of 3172 3856 cmd.exe 76 PID 3856 wrote to memory of 3888 3856 cmd.exe 78 PID 3856 wrote to memory of 3888 3856 cmd.exe 78 PID 3856 wrote to memory of 3888 3856 cmd.exe 78 PID 2972 wrote to memory of 576 2972 Explorer.EXE 79 PID 2972 wrote to memory of 576 2972 Explorer.EXE 79 PID 2972 wrote to memory of 576 2972 Explorer.EXE 79 PID 3856 wrote to memory of 652 3856 cmd.exe 80 PID 3856 wrote to memory of 652 3856 cmd.exe 80 PID 3856 wrote to memory of 652 3856 cmd.exe 80 PID 3856 wrote to memory of 1060 3856 cmd.exe 81 PID 3856 wrote to memory of 1060 3856 cmd.exe 81 PID 3856 wrote to memory of 1060 3856 cmd.exe 81 PID 3856 wrote to memory of 1468 3856 cmd.exe 82 PID 3856 wrote to memory of 1468 3856 cmd.exe 82 PID 3856 wrote to memory of 1468 3856 cmd.exe 82 PID 1060 wrote to memory of 1764 1060 8.exe 83 PID 1060 wrote to memory of 1764 1060 8.exe 83 PID 1060 wrote to memory of 1764 1060 8.exe 83 PID 576 wrote to memory of 1812 576 mstsc.exe 84 PID 576 wrote to memory of 1812 576 mstsc.exe 84 PID 576 wrote to memory of 1812 576 mstsc.exe 84 PID 3856 wrote to memory of 1928 3856 cmd.exe 85 PID 3856 wrote to memory of 1928 3856 cmd.exe 85 PID 3856 wrote to memory of 1928 3856 cmd.exe 85 PID 3856 wrote to memory of 2776 3856 cmd.exe 88 PID 3856 wrote to memory of 2776 3856 cmd.exe 88 PID 3856 wrote to memory of 2776 3856 cmd.exe 88 PID 1764 wrote to memory of 912 1764 cmd.exe 89 PID 1764 wrote to memory of 912 1764 cmd.exe 89 PID 1764 wrote to memory of 912 1764 cmd.exe 89 PID 3856 wrote to memory of 616 3856 cmd.exe 90 PID 3856 wrote to memory of 616 3856 cmd.exe 90 PID 3856 wrote to memory of 616 3856 cmd.exe 90 PID 3856 wrote to memory of 1644 3856 cmd.exe 91 PID 3856 wrote to memory of 1644 3856 cmd.exe 91 PID 3856 wrote to memory of 1644 3856 cmd.exe 91 PID 3856 wrote to memory of 2788 3856 cmd.exe 93 PID 3856 wrote to memory of 2788 3856 cmd.exe 93 PID 3856 wrote to memory of 2788 3856 cmd.exe 93 PID 3292 wrote to memory of 424 3292 3.exe 94 PID 3292 wrote to memory of 424 3292 3.exe 94 PID 3292 wrote to memory of 424 3292 3.exe 94 PID 3292 wrote to memory of 424 3292 3.exe 94 PID 3856 wrote to memory of 2828 3856 cmd.exe 95 PID 3856 wrote to memory of 2828 3856 cmd.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F3D5.tmp\F3D6.tmp\F3E7.bat C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"4⤵PID:3916
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe4⤵
- Executes dropped EXE
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe5⤵
- Loads dropped DLL
PID:424
-
-
-
C:\Users\Admin\AppData\Roaming\4.exeC:\Users\Admin\AppData\Roaming\4.exe4⤵
- Executes dropped EXE
PID:3208
-
-
C:\Users\Admin\AppData\Roaming\5.exeC:\Users\Admin\AppData\Roaming\5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
C:\Users\Admin\AppData\Roaming\6.exeC:\Users\Admin\AppData\Roaming\6.exe4⤵
- Executes dropped EXE
PID:3888
-
-
C:\Users\Admin\AppData\Roaming\7.exeC:\Users\Admin\AppData\Roaming\7.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652
-
-
C:\Users\Admin\AppData\Roaming\8.exeC:\Users\Admin\AppData\Roaming\8.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"6⤵
- Adds Run key to start application
PID:912
-
-
-
-
C:\Users\Admin\AppData\Roaming\9.exeC:\Users\Admin\AppData\Roaming\9.exe4⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Roaming\10.exeC:\Users\Admin\AppData\Roaming\10.exe4⤵
- Executes dropped EXE
PID:1928
-
-
C:\Users\Admin\AppData\Roaming\11.exeC:\Users\Admin\AppData\Roaming\11.exe4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Maps connected drives based on registry
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\12.exeC:\Users\Admin\AppData\Roaming\12.exe4⤵
- Executes dropped EXE
PID:616
-
-
C:\Users\Admin\AppData\Roaming\13.exeC:\Users\Admin\AppData\Roaming\13.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Users\Admin\AppData\Roaming\14.exeC:\Users\Admin\AppData\Roaming\14.exe4⤵
- Executes dropped EXE
PID:2788
-
-
C:\Users\Admin\AppData\Roaming\15.exeC:\Users\Admin\AppData\Roaming\15.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Users\Admin\AppData\Roaming\16.exeC:\Users\Admin\AppData\Roaming\16.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:2096
-
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\2.exe"3⤵PID:1812
-
-