Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
27/08/2020, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
2020-08-16_12-33-29.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
2020-08-16_12-33-29.bin.exe
Resource
win10v200722
General
-
Target
2020-08-16_12-33-29.bin.exe
-
Size
182KB
-
MD5
31293dfcacc8dc2e1e0daca8ad83ffe4
-
SHA1
49d99d21ee7070f9923e53247dff9359cef66e56
-
SHA256
8d6a931a8e8a65cf3a98fc2ee69ded2bd91ee03ef6677c6f653561dd4742ce17
-
SHA512
962605b126e84500a0039b6ddcc2dd6686c942e2aa762d09ab49f97200812721c837770e116f5cb0477ce6ce145529830ef6cfafadb311944c28d388a3ee68dc
Malware Config
Extracted
smokeloader
2020
http://rexstat35x.xyz/statweb955/
http://dexspot2x.xyz/statweb955/
http://atxspot20x.xyz/statweb955/
http://rexspot7x.xyz/statweb955/
http://fdmail85.club/statweb955/
http://servicem977x.xyz/statweb955/
http://advertxman7x.xyz/statweb955/
http://starxpush7x.xyz/statweb955/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 6 IoCs
pid Process 1744 D77A.exe 3304 D894.exe 3668 DF7B.exe 3360 E17F.exe 688 E326.exe 812 EEB0.exe -
Deletes itself 1 IoCs
pid Process 3044 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\D77A.exe D77A.exe -
Loads dropped DLL 1 IoCs
pid Process 2408 2020-08-16_12-33-29.bin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D77A.exe = "C:\\Windows\\System32\\D77A.exe" D77A.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI D77A.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1400429095-533421673-2598934218-1000\desktop.ini D77A.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini D77A.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 api.ipify.org 43 api.ipify.org 61 ip-api.com -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\D77A.exe D77A.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3952 set thread context of 2408 3952 2020-08-16_12-33-29.bin.exe 72 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jfxmedia.dll D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\LICENSE.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.powerpointmui.msi.16.en-us.xml.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-dialogs.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.zh_CN_5.5.0.165303.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench_1.2.1.v20140901-1244.jar D77A.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\PREVIEW.GIF.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\j2pcsc.dll.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterBold.ttf.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\sound.properties D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\core_ja.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1702.301.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderLargeTile.contrast-white_scale-200.png D77A.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\jmxremote.password.template D77A.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\dblook.bat.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSQRY32.CHM.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_ja_4.4.0.v20140623020002.jar D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] D77A.exe File created C:\Program Files\Java\jre1.8.0_66\bin\jfxmedia.dll.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\Weather_TileLargeSquare.scale-100.png D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Unlock.png D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\PREVIEW.GIF.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\LICENSE D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ko_KR.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_ja.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-125_contrast-black.png D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jli.dll.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-print.xml.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-api.xml D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-180.png D77A.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN058.XML.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-uihandler.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\METCONV.TXT.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\hprof.dll D77A.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jsdt.dll D77A.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-150.png D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfontj2d.properties.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win8.mp4 D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-100.png.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WorldClockLargeTile.contrast-black_scale-125.png D77A.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\AppPackageSmallTile.scale-100_contrast-white.png D77A.exe File created C:\Program Files\Microsoft Office\root\Flattener\api-ms-win-core-file-l1-2-0.dll.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tpcps.dll D77A.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] D77A.exe File opened for modification C:\Program Files\RevokeUse.css D77A.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\SmallTile.scale-125.png D77A.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-200_contrast-white.png D77A.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-stdio-l1-1-0.dll.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_zh_CN.jar D77A.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiling_zh_CN.jar.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_16.511.8780.0_neutral_split.scale-100_8wekyb3d8bbwe\Lumia.ViewerPlugin\Assets\IconEditMoment.scale-100.png D77A.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-progress.xml.id-53880B73.[telegram_@spacedatax].ROGER D77A.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2020-08-16_12-33-29.bin.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2020-08-16_12-33-29.bin.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2020-08-16_12-33-29.bin.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 192 vssadmin.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = a2ae91889a7cd601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 2020-08-16_12-33-29.bin.exe 2408 2020-08-16_12-33-29.bin.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 2408 2020-08-16_12-33-29.bin.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 2188 svchost.exe Token: SeCreatePagefilePrivilege 2188 svchost.exe Token: SeBackupPrivilege 2784 vssvc.exe Token: SeRestorePrivilege 2784 vssvc.exe Token: SeAuditPrivilege 2784 vssvc.exe Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3952 wrote to memory of 2408 3952 2020-08-16_12-33-29.bin.exe 72 PID 3044 wrote to memory of 1744 3044 Process not Found 76 PID 3044 wrote to memory of 1744 3044 Process not Found 76 PID 3044 wrote to memory of 1744 3044 Process not Found 76 PID 3044 wrote to memory of 3304 3044 Process not Found 77 PID 3044 wrote to memory of 3304 3044 Process not Found 77 PID 3044 wrote to memory of 3304 3044 Process not Found 77 PID 1744 wrote to memory of 1588 1744 D77A.exe 78 PID 1744 wrote to memory of 1588 1744 D77A.exe 78 PID 1588 wrote to memory of 2544 1588 cmd.exe 80 PID 1588 wrote to memory of 2544 1588 cmd.exe 80 PID 1588 wrote to memory of 192 1588 cmd.exe 81 PID 1588 wrote to memory of 192 1588 cmd.exe 81 PID 3044 wrote to memory of 3668 3044 Process not Found 84 PID 3044 wrote to memory of 3668 3044 Process not Found 84 PID 3044 wrote to memory of 3360 3044 Process not Found 85 PID 3044 wrote to memory of 3360 3044 Process not Found 85 PID 3044 wrote to memory of 3360 3044 Process not Found 85 PID 3044 wrote to memory of 688 3044 Process not Found 86 PID 3044 wrote to memory of 688 3044 Process not Found 86 PID 3044 wrote to memory of 688 3044 Process not Found 86 PID 3044 wrote to memory of 812 3044 Process not Found 87 PID 3044 wrote to memory of 812 3044 Process not Found 87 PID 3044 wrote to memory of 812 3044 Process not Found 87 PID 3044 wrote to memory of 3772 3044 Process not Found 88 PID 3044 wrote to memory of 3772 3044 Process not Found 88 PID 3044 wrote to memory of 3772 3044 Process not Found 88 PID 3044 wrote to memory of 3772 3044 Process not Found 88 PID 3044 wrote to memory of 2636 3044 Process not Found 89 PID 3044 wrote to memory of 2636 3044 Process not Found 89 PID 3044 wrote to memory of 2636 3044 Process not Found 89 PID 3044 wrote to memory of 3944 3044 Process not Found 90 PID 3044 wrote to memory of 3944 3044 Process not Found 90 PID 3044 wrote to memory of 3944 3044 Process not Found 90 PID 3044 wrote to memory of 3944 3044 Process not Found 90 PID 3044 wrote to memory of 3224 3044 Process not Found 91 PID 3044 wrote to memory of 3224 3044 Process not Found 91 PID 3044 wrote to memory of 3224 3044 Process not Found 91 PID 3044 wrote to memory of 3224 3044 Process not Found 91 PID 3044 wrote to memory of 2892 3044 Process not Found 92 PID 3044 wrote to memory of 2892 3044 Process not Found 92 PID 3044 wrote to memory of 2892 3044 Process not Found 92 PID 3044 wrote to memory of 2892 3044 Process not Found 92 PID 3044 wrote to memory of 2120 3044 Process not Found 93 PID 3044 wrote to memory of 2120 3044 Process not Found 93 PID 3044 wrote to memory of 2120 3044 Process not Found 93 PID 812 wrote to memory of 4076 812 EEB0.exe 94 PID 812 wrote to memory of 4076 812 EEB0.exe 94 PID 812 wrote to memory of 4076 812 EEB0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2020-08-16_12-33-29.bin.exe"C:\Users\Admin\AppData\Local\Temp\2020-08-16_12-33-29.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\2020-08-16_12-33-29.bin.exe"C:\Users\Admin\AppData\Local\Temp\2020-08-16_12-33-29.bin.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2408
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
C:\Users\Admin\AppData\Local\Temp\D77A.exeC:\Users\Admin\AppData\Local\Temp\D77A.exe1⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2544
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:192
-
-
-
C:\Users\Admin\AppData\Local\Temp\D894.exeC:\Users\Admin\AppData\Local\Temp\D894.exe1⤵
- Executes dropped EXE
PID:3304
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\Users\Admin\AppData\Local\Temp\DF7B.exeC:\Users\Admin\AppData\Local\Temp\DF7B.exe1⤵
- Executes dropped EXE
PID:3668
-
C:\Users\Admin\AppData\Local\Temp\E17F.exeC:\Users\Admin\AppData\Local\Temp\E17F.exe1⤵
- Executes dropped EXE
PID:3360
-
C:\Users\Admin\AppData\Local\Temp\E326.exeC:\Users\Admin\AppData\Local\Temp\E326.exe1⤵
- Executes dropped EXE
PID:688
-
C:\Users\Admin\AppData\Local\Temp\EEB0.exeC:\Users\Admin\AppData\Local\Temp\EEB0.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\swap.cmd" "2⤵PID:4076
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3772
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2636
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3944
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3224
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2892
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2120