Overview
overview
10Static
static
8ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
3Resubmissions
18-11-2020 14:18
201118-dj27sn3f52 1018-11-2020 13:42
201118-1arz86e7w6 1018-11-2020 13:38
201118-n8jh228ctn 10Analysis
-
max time kernel
23s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-11-2020 13:38
Static task
static1
Behavioral task
behavioral1
Sample
2019-09-02_22-41-10.bin.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
31.bin.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
3DMark 11 Advanced Edition.bin.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
CVE-2018-15982_PoC.swf
Resource
win10v20201028
Behavioral task
behavioral6
Sample
DiskInternals_Uneraser_v5_keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
ForceOp 2.8.7 - By RaiSence.bin.exe
Resource
win10v20201028
Behavioral task
behavioral8
Sample
HYDRA.bin.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral10
Sample
LtHv0O2KZDK4M637.bin.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
OnlineInstaller.bin.exe
Resource
win10v20201028
Behavioral task
behavioral12
Sample
Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.bin.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Treasure.Vault.3D.Screensaver.keygen.by.Paradox.bin.exe
Resource
win10v20201028
Behavioral task
behavioral14
Sample
VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
Behavioral task
behavioral16
Sample
api.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
efd97b1038e063779fb32a3ab35adc481679a5c6c8e3f4f69c44987ff08b6ea4.js
Resource
win10v20201028
Behavioral task
behavioral18
Sample
good.bin.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
infected dot net installer.bin.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
update.bin.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
vir1.xls
Resource
win10v20201028
Behavioral task
behavioral22
Sample
xNet.dll
Resource
win10v20201028
Behavioral task
behavioral23
Sample
1.bin.exe
Resource
win10v20201028
Behavioral task
behavioral24
Sample
VPN/VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
VPN/xNet.dll
Resource
win10v20201028
Behavioral task
behavioral26
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
General
Malware Config
Extracted
formbook
4.0
http://www.worstig.com/w9z/
crazzysex.com
hanferd.com
gteesrd.com
bayfrontbabyplace.com
jicuiquan.net
relationshiplink.net
ohchacyberphoto.com
kauegimenes.com
powerful-seldom.com
ketotoken.com
make-money-online-success.com
redgoldcollection.com
hannan-football.com
hamptondc.com
vllii.com
aa8520.com
platform35markethall.com
larozeimmo.com
oligopoly.net
llhak.info
fisioservice.com
tesla-magnumopus.com
cocodrilodigital.com
pinegrovesg.com
traveladventureswithme.com
hebitaixin.com
golphysi.com
gayjeans.com
quickhire.expert
randomviews1.com
eatatnobu.com
topmabati.com
mediaupside.com
spillerakademi.com
thebowtie.store
sensomaticloadcell.com
turismodemadrid.net
yuhe89.com
wernerkrug.com
cdpogo.net
dannynhois.com
realestatestructureddata.com
matewhereareyou.net
laimeibei.ltd
sw328.com
lmwworks.net
xtremefish.com
tonerias.com
dsooneclinicianexpert.com
281clara.com
smmcommunity.net
dreamneeds.info
twocraft.com
yasasiite.salon
advk8qi.top
drabist.com
europartnersplus.com
saltbgone.com
teslaoceanic.info
bestmedicationstore.com
buynewcartab.live
prospect.money
viebrocks.com
transportationhappy.com
Extracted
formbook
4.1
http://www.joomlas123.com/i0qi/
mytakeawaybox.com
goutaihuo.com
kuzey.site
uppertenpiercings.amsterdam
honeygrandpa.com
jenniferabramslaw.com
ncarian.com
heavilymeditatedhouston.com
gsbjyzx.com
akisanblog.com
taoyuanreed.com
jasperrvservices.com
yabbanet.com
myhealthfuldiet.com
flipdigitalcoins.com
toes.photos
shoottillyoumiss.com
maserental.com
smarteacher.net
hamdimagdeco.com
wuxifanggang.com
alamediationtraining.com
vfoe.team
kms-sp.com
gfidevfight.net
anomadbackpacker.com
21oms.us
australianseniorpreneur.com
valuereceipt.com
superbetbahis.com
rsrgoup.com
hoidonghuongkimson.com
parmedpharma.com
discoveryoverload.com
livetv247.win
jepekha.com
6o5ttvst.biz
netcorrespondents.com
cscycorp.com
emonkeygraphics.com
tillyaeva-lola.news
dgx9.com
jiucai5.com
justwoodsouthern.com
dentalexpertstraining.com
amazoncarpet.com
xsxnet.net
androidaso.com
jinhucai.com
wellnessitaly.store
clashrayalefreebies.com
wxvbill.com
quantun.network
allnaturalcbdshampton.com
mobo.technology
livinglifeawakened.com
canliarkadas.net
littlealohadaycare.com
wendyoei.com
kaz.site
puremind.info
queenscrossingneurosurgery.com
theworldexams.com
taptrips.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
resource yara_rule behavioral23/memory/3352-97-0x0000000005270000-0x0000000005272000-memory.dmp coreentity -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral23/files/0x000100000001ab77-39.dat family_agenttesla behavioral23/files/0x000100000001ab77-40.dat family_agenttesla -
resource yara_rule behavioral23/files/0x000100000001ab75-23.dat cryptone behavioral23/files/0x000100000001ab75-24.dat cryptone -
Formbook Payload 4 IoCs
resource yara_rule behavioral23/memory/1708-20-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral23/memory/1708-22-0x000000000041E2D0-mapping.dmp formbook behavioral23/memory/3168-59-0x0000000000000000-mapping.dmp formbook behavioral23/memory/4968-175-0x0000000000000000-mapping.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral23/memory/3352-109-0x0000000006D20000-0x0000000006D73000-memory.dmp rezer0 -
Executes dropped EXE 16 IoCs
pid Process 696 2.exe 3460 3.exe 1524 4.exe 3520 5.exe 2128 6.exe 1708 2.exe 4064 7.exe 4028 8.exe 3352 9.exe 1520 10.exe 1044 11.exe 3764 12.exe 1856 13.exe 3632 14.exe 1240 15.exe 4004 16.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16.exe 16.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral23/memory/4028-72-0x0000000001140000-0x000000000114F000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16.exe = "C:\\Windows\\System32\\16.exe" 16.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1985363256-3005190890-1182679451-1000\desktop.ini 16.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 11.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\16.exe 16.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 696 set thread context of 1708 696 2.exe 85 PID 1708 set thread context of 2864 1708 2.exe 57 -
Drops file in Program Files directory 40 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip32.dll 16.exe File created C:\Program Files\7-Zip\7-zip.chm.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\7zFM.exe.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\Lang\az.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7z.sfx.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 16.exe File opened for modification C:\Program Files\7-Zip\History.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7z.exe 16.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 16.exe File created C:\Program Files\7-Zip\Lang\ar.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\7z.exe.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 16.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 16.exe File opened for modification C:\Program Files\7-Zip\7z.dll.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\Lang\af.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\7-zip.dll.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\Lang\an.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 16.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 16.exe File created C:\Program Files\7-Zip\Lang\ba.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 16.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 16.exe File created C:\Program Files\7-Zip\History.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\7-zip32.dll.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 16.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 16.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 16.exe File created C:\Program Files\7-Zip\7zCon.sfx.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\7z.exe.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\Lang\ast.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 16.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\History.txt 16.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll.id-A8F9FC69.[[email protected]].BOMBO 16.exe File created C:\Program Files\7-Zip\7z.sfx.id-A8F9FC69.[[email protected]].BOMBO 16.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt.id-A8F9FC69.[[email protected]].BOMBO 16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 696 2.exe 696 2.exe 1708 2.exe 1708 2.exe 1708 2.exe 1708 2.exe 4028 8.exe 3168 explorer.exe 3168 explorer.exe 4004 16.exe 4004 16.exe 4004 16.exe 4004 16.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 696 2.exe 1708 2.exe 1708 2.exe 1708 2.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1708 2.exe Token: SeDebugPrivilege 3520 5.exe Token: SeDebugPrivilege 4028 8.exe Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeDebugPrivilege 3168 explorer.exe Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3460 3.exe 4064 7.exe 3520 5.exe 1856 13.exe 1240 15.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2684 1080 1.bin.exe 76 PID 1080 wrote to memory of 2684 1080 1.bin.exe 76 PID 2684 wrote to memory of 1380 2684 cmd.exe 79 PID 2684 wrote to memory of 1380 2684 cmd.exe 79 PID 2684 wrote to memory of 696 2684 cmd.exe 80 PID 2684 wrote to memory of 696 2684 cmd.exe 80 PID 2684 wrote to memory of 696 2684 cmd.exe 80 PID 2684 wrote to memory of 3460 2684 cmd.exe 81 PID 2684 wrote to memory of 3460 2684 cmd.exe 81 PID 2684 wrote to memory of 3460 2684 cmd.exe 81 PID 2684 wrote to memory of 1524 2684 cmd.exe 82 PID 2684 wrote to memory of 1524 2684 cmd.exe 82 PID 2684 wrote to memory of 1524 2684 cmd.exe 82 PID 2684 wrote to memory of 3520 2684 cmd.exe 83 PID 2684 wrote to memory of 3520 2684 cmd.exe 83 PID 2684 wrote to memory of 3520 2684 cmd.exe 83 PID 696 wrote to memory of 1708 696 2.exe 85 PID 696 wrote to memory of 1708 696 2.exe 85 PID 696 wrote to memory of 1708 696 2.exe 85 PID 2684 wrote to memory of 2128 2684 cmd.exe 86 PID 2684 wrote to memory of 2128 2684 cmd.exe 86 PID 2684 wrote to memory of 2128 2684 cmd.exe 86 PID 2684 wrote to memory of 4064 2684 cmd.exe 88 PID 2684 wrote to memory of 4064 2684 cmd.exe 88 PID 2684 wrote to memory of 4064 2684 cmd.exe 88 PID 2864 wrote to memory of 3168 2864 Explorer.EXE 89 PID 2864 wrote to memory of 3168 2864 Explorer.EXE 89 PID 2864 wrote to memory of 3168 2864 Explorer.EXE 89 PID 2684 wrote to memory of 4028 2684 cmd.exe 90 PID 2684 wrote to memory of 4028 2684 cmd.exe 90 PID 2684 wrote to memory of 4028 2684 cmd.exe 90 PID 2684 wrote to memory of 3352 2684 cmd.exe 91 PID 2684 wrote to memory of 3352 2684 cmd.exe 91 PID 2684 wrote to memory of 3352 2684 cmd.exe 91 PID 2684 wrote to memory of 1520 2684 cmd.exe 92 PID 2684 wrote to memory of 1520 2684 cmd.exe 92 PID 2684 wrote to memory of 1520 2684 cmd.exe 92 PID 2684 wrote to memory of 1044 2684 cmd.exe 93 PID 2684 wrote to memory of 1044 2684 cmd.exe 93 PID 2684 wrote to memory of 1044 2684 cmd.exe 93 PID 2684 wrote to memory of 3764 2684 cmd.exe 94 PID 2684 wrote to memory of 3764 2684 cmd.exe 94 PID 2684 wrote to memory of 3764 2684 cmd.exe 94 PID 2684 wrote to memory of 1856 2684 cmd.exe 95 PID 2684 wrote to memory of 1856 2684 cmd.exe 95 PID 2684 wrote to memory of 1856 2684 cmd.exe 95 PID 2684 wrote to memory of 3632 2684 cmd.exe 96 PID 2684 wrote to memory of 3632 2684 cmd.exe 96 PID 2684 wrote to memory of 3632 2684 cmd.exe 96 PID 3168 wrote to memory of 1516 3168 explorer.exe 97 PID 3168 wrote to memory of 1516 3168 explorer.exe 97 PID 3168 wrote to memory of 1516 3168 explorer.exe 97 PID 2684 wrote to memory of 1240 2684 cmd.exe 99 PID 2684 wrote to memory of 1240 2684 cmd.exe 99 PID 2684 wrote to memory of 1240 2684 cmd.exe 99 PID 2684 wrote to memory of 4004 2684 cmd.exe 100 PID 2684 wrote to memory of 4004 2684 cmd.exe 100 PID 2684 wrote to memory of 4004 2684 cmd.exe 100 PID 4004 wrote to memory of 4128 4004 16.exe 101 PID 4004 wrote to memory of 4128 4004 16.exe 101 PID 4028 wrote to memory of 4148 4028 8.exe 102 PID 4028 wrote to memory of 4148 4028 8.exe 102 PID 4028 wrote to memory of 4148 4028 8.exe 102 PID 2684 wrote to memory of 4332 2684 cmd.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\1.bin.exe"C:\Users\Admin\AppData\Local\Temp\1.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8CC5.tmp\8CD5.tmp\8CD6.bat C:\Users\Admin\AppData\Local\Temp\1.bin.exe"3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"4⤵PID:1380
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
-
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3460
-
-
C:\Users\Admin\AppData\Roaming\4.exeC:\Users\Admin\AppData\Roaming\4.exe4⤵
- Executes dropped EXE
PID:1524
-
-
C:\Users\Admin\AppData\Roaming\5.exeC:\Users\Admin\AppData\Roaming\5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3520
-
-
C:\Users\Admin\AppData\Roaming\6.exeC:\Users\Admin\AppData\Roaming\6.exe4⤵
- Executes dropped EXE
PID:2128
-
-
C:\Users\Admin\AppData\Roaming\7.exeC:\Users\Admin\AppData\Roaming\7.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
C:\Users\Admin\AppData\Roaming\8.exeC:\Users\Admin\AppData\Roaming\8.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"5⤵PID:4148
-
-
-
C:\Users\Admin\AppData\Roaming\9.exeC:\Users\Admin\AppData\Roaming\9.exe4⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Roaming\10.exeC:\Users\Admin\AppData\Roaming\10.exe4⤵
- Executes dropped EXE
PID:1520
-
-
C:\Users\Admin\AppData\Roaming\11.exeC:\Users\Admin\AppData\Roaming\11.exe4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Maps connected drives based on registry
PID:1044
-
-
C:\Users\Admin\AppData\Roaming\12.exeC:\Users\Admin\AppData\Roaming\12.exe4⤵
- Executes dropped EXE
PID:3764
-
-
C:\Users\Admin\AppData\Roaming\13.exeC:\Users\Admin\AppData\Roaming\13.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
C:\Users\Admin\AppData\Roaming\14.exeC:\Users\Admin\AppData\Roaming\14.exe4⤵
- Executes dropped EXE
PID:3632
-
-
C:\Users\Admin\AppData\Roaming\15.exeC:\Users\Admin\AppData\Roaming\15.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
C:\Users\Admin\AppData\Roaming\16.exeC:\Users\Admin\AppData\Roaming\16.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:4128
-
-
-
C:\Users\Admin\AppData\Roaming\17.exeC:\Users\Admin\AppData\Roaming\17.exe4⤵PID:4332
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\2.exe"3⤵PID:1516
-
-