Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 18:07
Static task
static1
Behavioral task
behavioral1
Sample
b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe
Resource
win10v20201028
General
-
Target
b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe
-
Size
1.1MB
-
MD5
6d01213c51ed2570b263b28fa4b9f320
-
SHA1
aa5aa4142ff6de7e5560424d252c2bf234f14651
-
SHA256
b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261
-
SHA512
0ca8354473740c4f6212159f98571eaf3041ea895a3e067b52c9b5e380c948cc5df0fa18171674c35afd5f0bdeb75e676b41a548be1a3e05ed5f7906a8365766
Malware Config
Extracted
asyncrat
0.5.7B
agentttt.ac.ug:6970
agentpurple.ac.ug:6970
AsyncMutex_6SI8OkPnk
-
aes_key
16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
agentttt.ac.ug,agentpurple.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4048-83-0x0000000000400000-0x000000000040C000-memory.dmp disable_win_def behavioral2/memory/4048-84-0x000000000040616E-mapping.dmp disable_win_def behavioral2/memory/204-97-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral2/memory/204-99-0x0000000000403BEE-mapping.dmp disable_win_def behavioral2/files/0x000200000001ab62-118.dat disable_win_def behavioral2/files/0x000200000001ab62-119.dat disable_win_def -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3948-74-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/3948-75-0x000000000040C76E-mapping.dmp asyncrat -
ModiLoader First Stage 1 IoCs
resource yara_rule behavioral2/memory/2088-131-0x0000000004BE0000-0x0000000004C3C000-memory.dmp modiloader_stage1 -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2088-216-0x00000000054E0000-0x000000000552D000-memory.dmp modiloader_stage2 -
Executes dropped EXE 9 IoCs
pid Process 196 axcjgfhwvvas.exe 1636 PI7wkan2Gv.exe 2088 kXoQVCYVve.exe 1220 frPmSluK4y.exe 2360 UKpa3F9fnz.exe 3948 PI7wkan2Gv.exe 4048 frPmSluK4y.exe 204 UKpa3F9fnz.exe 1512 jqf5mjcv.exe -
Loads dropped DLL 8 IoCs
pid Process 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features UKpa3F9fnz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" UKpa3F9fnz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\LocalLow\n9h9r91h8fna789q\desktop.ini b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral2/files/0x000100000001ab77-33.dat js -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 412 set thread context of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 1636 set thread context of 3948 1636 PI7wkan2Gv.exe 87 PID 1220 set thread context of 4048 1220 frPmSluK4y.exe 88 PID 2360 set thread context of 204 2360 UKpa3F9fnz.exe 90 -
Delays execution with timeout.exe 1 IoCs
pid Process 2232 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2248 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 418 IoCs
pid Process 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe 1856 powershell.exe 1856 powershell.exe 2920 powershell.exe 2920 powershell.exe 1856 powershell.exe 2920 powershell.exe 3968 powershell.exe 3956 powershell.exe 3696 powershell.exe 692 powershell.exe 692 powershell.exe 1200 powershell.exe 1200 powershell.exe 3888 powershell.exe 3888 powershell.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe Token: SeDebugPrivilege 1636 PI7wkan2Gv.exe Token: SeDebugPrivilege 1220 frPmSluK4y.exe Token: SeDebugPrivilege 4048 frPmSluK4y.exe Token: SeDebugPrivilege 2360 UKpa3F9fnz.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeIncreaseQuotaPrivilege 2920 powershell.exe Token: SeSecurityPrivilege 2920 powershell.exe Token: SeTakeOwnershipPrivilege 2920 powershell.exe Token: SeLoadDriverPrivilege 2920 powershell.exe Token: SeSystemProfilePrivilege 2920 powershell.exe Token: SeSystemtimePrivilege 2920 powershell.exe Token: SeProfSingleProcessPrivilege 2920 powershell.exe Token: SeIncBasePriorityPrivilege 2920 powershell.exe Token: SeCreatePagefilePrivilege 2920 powershell.exe Token: SeBackupPrivilege 2920 powershell.exe Token: SeRestorePrivilege 2920 powershell.exe Token: SeShutdownPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeSystemEnvironmentPrivilege 2920 powershell.exe Token: SeRemoteShutdownPrivilege 2920 powershell.exe Token: SeUndockPrivilege 2920 powershell.exe Token: SeManageVolumePrivilege 2920 powershell.exe Token: 33 2920 powershell.exe Token: 34 2920 powershell.exe Token: 35 2920 powershell.exe Token: 36 2920 powershell.exe Token: SeDebugPrivilege 3968 powershell.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 692 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 3888 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4048 frPmSluK4y.exe 4048 frPmSluK4y.exe -
Suspicious use of WriteProcessMemory 90 IoCs
description pid Process procid_target PID 412 wrote to memory of 196 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 78 PID 412 wrote to memory of 196 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 78 PID 412 wrote to memory of 196 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 78 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 412 wrote to memory of 2320 412 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 79 PID 2320 wrote to memory of 1636 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 80 PID 2320 wrote to memory of 1636 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 80 PID 2320 wrote to memory of 1636 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 80 PID 2320 wrote to memory of 2088 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 81 PID 2320 wrote to memory of 2088 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 81 PID 2320 wrote to memory of 2088 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 81 PID 2320 wrote to memory of 1220 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 82 PID 2320 wrote to memory of 1220 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 82 PID 2320 wrote to memory of 1220 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 82 PID 2320 wrote to memory of 2360 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 83 PID 2320 wrote to memory of 2360 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 83 PID 2320 wrote to memory of 2360 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 83 PID 2320 wrote to memory of 2208 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 84 PID 2320 wrote to memory of 2208 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 84 PID 2320 wrote to memory of 2208 2320 b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe 84 PID 2208 wrote to memory of 2232 2208 cmd.exe 86 PID 2208 wrote to memory of 2232 2208 cmd.exe 86 PID 2208 wrote to memory of 2232 2208 cmd.exe 86 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1636 wrote to memory of 3948 1636 PI7wkan2Gv.exe 87 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 1220 wrote to memory of 4048 1220 frPmSluK4y.exe 88 PID 4048 wrote to memory of 744 4048 frPmSluK4y.exe 89 PID 4048 wrote to memory of 744 4048 frPmSluK4y.exe 89 PID 4048 wrote to memory of 744 4048 frPmSluK4y.exe 89 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 2360 wrote to memory of 204 2360 UKpa3F9fnz.exe 90 PID 204 wrote to memory of 1856 204 UKpa3F9fnz.exe 91 PID 204 wrote to memory of 1856 204 UKpa3F9fnz.exe 91 PID 204 wrote to memory of 1856 204 UKpa3F9fnz.exe 91 PID 528 wrote to memory of 352 528 DllHost.exe 94 PID 528 wrote to memory of 352 528 DllHost.exe 94 PID 528 wrote to memory of 352 528 DllHost.exe 94 PID 352 wrote to memory of 1512 352 cmd.exe 96 PID 352 wrote to memory of 1512 352 cmd.exe 96 PID 528 wrote to memory of 2248 528 DllHost.exe 97 PID 528 wrote to memory of 2248 528 DllHost.exe 97 PID 528 wrote to memory of 2248 528 DllHost.exe 97 PID 1512 wrote to memory of 2920 1512 jqf5mjcv.exe 99 PID 1512 wrote to memory of 2920 1512 jqf5mjcv.exe 99 PID 1512 wrote to memory of 3968 1512 jqf5mjcv.exe 103 PID 1512 wrote to memory of 3968 1512 jqf5mjcv.exe 103 PID 1512 wrote to memory of 3956 1512 jqf5mjcv.exe 105 PID 1512 wrote to memory of 3956 1512 jqf5mjcv.exe 105 PID 1512 wrote to memory of 3696 1512 jqf5mjcv.exe 107 PID 1512 wrote to memory of 3696 1512 jqf5mjcv.exe 107 PID 1512 wrote to memory of 692 1512 jqf5mjcv.exe 109 PID 1512 wrote to memory of 692 1512 jqf5mjcv.exe 109 PID 1512 wrote to memory of 1200 1512 jqf5mjcv.exe 111 PID 1512 wrote to memory of 1200 1512 jqf5mjcv.exe 111 PID 1512 wrote to memory of 3888 1512 jqf5mjcv.exe 113 PID 1512 wrote to memory of 3888 1512 jqf5mjcv.exe 113 PID 1512 wrote to memory of 2128 1512 jqf5mjcv.exe 115 PID 1512 wrote to memory of 2128 1512 jqf5mjcv.exe 115 PID 1512 wrote to memory of 4148 1512 jqf5mjcv.exe 117 PID 1512 wrote to memory of 4148 1512 jqf5mjcv.exe 117 PID 1512 wrote to memory of 4272 1512 jqf5mjcv.exe 119 PID 1512 wrote to memory of 4272 1512 jqf5mjcv.exe 119 PID 1512 wrote to memory of 4372 1512 jqf5mjcv.exe 121 PID 1512 wrote to memory of 4372 1512 jqf5mjcv.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe"C:\Users\Admin\AppData\Local\Temp\b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe"C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe"2⤵
- Executes dropped EXE
PID:196
-
-
C:\Users\Admin\AppData\Local\Temp\b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe"{path}"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\PI7wkan2Gv.exe"C:\Users\Admin\AppData\Local\Temp\PI7wkan2Gv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\PI7wkan2Gv.exe"C:\Users\Admin\AppData\Local\Temp\PI7wkan2Gv.exe"4⤵
- Executes dropped EXE
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\kXoQVCYVve.exe"C:\Users\Admin\AppData\Local\Temp\kXoQVCYVve.exe"3⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\frPmSluK4y.exe"C:\Users\Admin\AppData\Local\Temp\frPmSluK4y.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\frPmSluK4y.exe"C:\Users\Admin\AppData\Local\Temp\frPmSluK4y.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\fffjj0dd.inf5⤵PID:744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UKpa3F9fnz.exe"C:\Users\Admin\AppData\Local\Temp\UKpa3F9fnz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\UKpa3F9fnz.exe"C:\Users\Admin\AppData\Local\Temp\UKpa3F9fnz.exe"4⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\b99d5d0e6ebfd38c47b999a704cb2558797ed6b149356075036a0de57fbca261.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2232
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\temp\jqf5mjcv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\temp\jqf5mjcv.exeC:\Windows\temp\jqf5mjcv.exe3⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true4⤵
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 64⤵PID:2128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 04⤵PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 64⤵PID:4272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 64⤵PID:4372
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-