Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-12-2020 17:21
Static task
static1
Behavioral task
behavioral1
Sample
2626e0990d2db399b35b6e357fd53ed1.exe
Resource
win7v20201028
General
-
Target
2626e0990d2db399b35b6e357fd53ed1.exe
-
Size
548KB
-
MD5
2626e0990d2db399b35b6e357fd53ed1
-
SHA1
28cc3944167b0da48c4e81333e08b5c80244c572
-
SHA256
ada1c5359c35e6b70c5a2d5533f9d725f86a1e155c8486bfd2941c9b40478ea2
-
SHA512
7b741f662f70e78f9a7094b0892e93fba461f992ac938f922379179e365b4ecdeaf8fc7996f6da9aa44e52d5f815ffacbe17d425545da605d89845183938f2f1
Malware Config
Extracted
danabot
1732
3
23.254.215.116:443
104.227.34.227:443
23.254.118.230:443
51.195.73.129:443
-
embedded_hash
4A3DA3F8025592B0C9FF1DB7E462C9FA
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 6 IoCs
flow pid Process 24 2740 RUNDLL32.EXE 27 2892 WScript.exe 29 2892 WScript.exe 31 2892 WScript.exe 33 2892 WScript.exe 35 2892 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 1848 File2.exe 1256 lvloa.exe 1060 6owe.exe 936 4aer.exe 1392 startnat.exe 1556 SmartClock.exe 2296 CL_Debug_Log.txt 2644 wrgeqcmnju.exe 2036 Helper.exe 1996 Helper.exe 1440 Helper.exe 2396 tor.exe 1156 Helper.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6owe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion startnat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion startnat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6owe.exe -
Deletes itself 1 IoCs
pid Process 776 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4aer.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Wine 4aer.exe Key opened \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Wine startnat.exe Key opened \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Wine lvloa.exe Key opened \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Wine 6owe.exe -
Loads dropped DLL 53 IoCs
pid Process 1824 2626e0990d2db399b35b6e357fd53ed1.exe 1848 File2.exe 1848 File2.exe 1848 File2.exe 1848 File2.exe 1848 File2.exe 1256 lvloa.exe 1256 lvloa.exe 1848 File2.exe 1848 File2.exe 1060 6owe.exe 1060 6owe.exe 1060 6owe.exe 1848 File2.exe 1848 File2.exe 936 4aer.exe 936 4aer.exe 936 4aer.exe 936 4aer.exe 1848 File2.exe 1848 File2.exe 1392 startnat.exe 1392 startnat.exe 1392 startnat.exe 936 4aer.exe 936 4aer.exe 1556 SmartClock.exe 1556 SmartClock.exe 1556 SmartClock.exe 1392 startnat.exe 2616 cmd.exe 2616 cmd.exe 2644 wrgeqcmnju.exe 2644 wrgeqcmnju.exe 2696 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 2740 RUNDLL32.EXE 2740 RUNDLL32.EXE 2740 RUNDLL32.EXE 2740 RUNDLL32.EXE 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\6O9TWDTA\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini RUNDLL32.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1256 lvloa.exe 936 4aer.exe 1060 6owe.exe 1392 startnat.exe 1556 SmartClock.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1440 2036 Helper.exe 65 -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001310d-84.dat autoit_exe behavioral1/files/0x000500000001311c-88.dat autoit_exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\solfer\wiatrace.log File2.exe File created C:\Program Files (x86)\solfer\4aer.exe File2.exe File created C:\Program Files (x86)\solfer\boleroh\msorcl32.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\lvloa.exe File2.exe File opened for modification C:\Program Files (x86)\solfer\boleroh\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Program Files (x86)\solfer\Microsoft.IdentityServer.Web.Resources.dll File2.exe File created C:\Program Files (x86)\solfer\6owe.exe File2.exe File created C:\Program Files (x86)\solfer\startnat.exe File2.exe File created C:\Program Files (x86)\solfer\boleroh\msdasc.chm File2.exe File opened for modification C:\Program Files (x86)\solfer\boleroh\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2626e0990d2db399b35b6e357fd53ed1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2626e0990d2db399b35b6e357fd53ed1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lvloa.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1660 timeout.exe 2364 timeout.exe 2484 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 lvloa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 lvloa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1556 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1256 lvloa.exe 1060 6owe.exe 936 4aer.exe 1392 startnat.exe 1556 SmartClock.exe 616 powershell.exe 616 powershell.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 2740 RUNDLL32.EXE 2740 RUNDLL32.EXE 2312 powershell.exe 2312 powershell.exe 2036 Helper.exe 2396 tor.exe 2396 tor.exe 2396 tor.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 2296 CL_Debug_Log.txt Token: 35 2296 CL_Debug_Log.txt Token: SeSecurityPrivilege 2296 CL_Debug_Log.txt Token: SeSecurityPrivilege 2296 CL_Debug_Log.txt Token: SeDebugPrivilege 2696 rundll32.exe Token: SeDebugPrivilege 2740 RUNDLL32.EXE Token: SeDebugPrivilege 616 powershell.exe Token: SeRestorePrivilege 1440 Helper.exe Token: 35 1440 Helper.exe Token: SeSecurityPrivilege 1440 Helper.exe Token: SeSecurityPrivilege 1440 Helper.exe Token: SeDebugPrivilege 2312 powershell.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1824 2626e0990d2db399b35b6e357fd53ed1.exe 1824 2626e0990d2db399b35b6e357fd53ed1.exe 1392 startnat.exe 1392 startnat.exe 1392 startnat.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 1996 Helper.exe 1996 Helper.exe 1996 Helper.exe 2740 RUNDLL32.EXE 1156 Helper.exe 1156 Helper.exe 1156 Helper.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1392 startnat.exe 1392 startnat.exe 1392 startnat.exe 2036 Helper.exe 2036 Helper.exe 2036 Helper.exe 1996 Helper.exe 1996 Helper.exe 1996 Helper.exe 1156 Helper.exe 1156 Helper.exe 1156 Helper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 1848 1824 2626e0990d2db399b35b6e357fd53ed1.exe 31 PID 1824 wrote to memory of 776 1824 2626e0990d2db399b35b6e357fd53ed1.exe 32 PID 1824 wrote to memory of 776 1824 2626e0990d2db399b35b6e357fd53ed1.exe 32 PID 1824 wrote to memory of 776 1824 2626e0990d2db399b35b6e357fd53ed1.exe 32 PID 1824 wrote to memory of 776 1824 2626e0990d2db399b35b6e357fd53ed1.exe 32 PID 776 wrote to memory of 1660 776 cmd.exe 34 PID 776 wrote to memory of 1660 776 cmd.exe 34 PID 776 wrote to memory of 1660 776 cmd.exe 34 PID 776 wrote to memory of 1660 776 cmd.exe 34 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1256 1848 File2.exe 35 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 1060 1848 File2.exe 36 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 936 1848 File2.exe 37 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 1848 wrote to memory of 1392 1848 File2.exe 38 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 936 wrote to memory of 1556 936 4aer.exe 39 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1392 wrote to memory of 2296 1392 startnat.exe 40 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41 PID 1060 wrote to memory of 2312 1060 6owe.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\File2.exe"C:\Users\Admin\AppData\Local\Temp\File2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\solfer\boleroh\lvloa.exe"C:\Program Files (x86)\solfer\boleroh\lvloa.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe"4⤵
- Loads dropped DLL
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe"C:\Users\Admin\AppData\Local\Temp\wrgeqcmnju.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.EXE6⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\WRGEQC~1.DLL,VAhMTBI=7⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA026.tmp.ps1"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpCEE5.tmp.ps1"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost9⤵PID:2752
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:1892
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\jovurlj.vbs"4⤵PID:2836
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jovurlj.vbs"5⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2892
-
-
-
-
C:\Program Files (x86)\solfer\6owe.exe"C:\Program Files (x86)\solfer\6owe.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\nlrkhvudqavgn & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵PID:2312
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\nlrkhvudqavgn & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵PID:2416
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2484
-
-
-
-
C:\Program Files (x86)\solfer\4aer.exe"C:\Program Files (x86)\solfer\4aer.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
-
C:\Program Files (x86)\solfer\startnat.exe"C:\Program Files (x86)\solfer\startnat.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵PID:2500
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
PID:2552
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\y1nsc6FROj & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1660
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E4B98E2F-06BC-4764-8647-FED9A1DBFE62} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]1⤵PID:2376
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1996
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵PID:616
-