Analysis
-
max time kernel
142s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 17:21
Static task
static1
Behavioral task
behavioral1
Sample
2626e0990d2db399b35b6e357fd53ed1.exe
Resource
win7v20201028
General
-
Target
2626e0990d2db399b35b6e357fd53ed1.exe
-
Size
548KB
-
MD5
2626e0990d2db399b35b6e357fd53ed1
-
SHA1
28cc3944167b0da48c4e81333e08b5c80244c572
-
SHA256
ada1c5359c35e6b70c5a2d5533f9d725f86a1e155c8486bfd2941c9b40478ea2
-
SHA512
7b741f662f70e78f9a7094b0892e93fba461f992ac938f922379179e365b4ecdeaf8fc7996f6da9aa44e52d5f815ffacbe17d425545da605d89845183938f2f1
Malware Config
Extracted
danabot
1732
3
23.254.215.116:443
104.227.34.227:443
23.254.118.230:443
51.195.73.129:443
-
embedded_hash
4A3DA3F8025592B0C9FF1DB7E462C9FA
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 5 IoCs
Processes:
RUNDLL32.EXEWScript.exeflow pid process 34 4540 RUNDLL32.EXE 36 4992 WScript.exe 38 4992 WScript.exe 40 4992 WScript.exe 42 4992 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
File2.exelvloa.exe6owe.exe4aer.exestartnat.exeSmartClock.exeCL_Debug_Log.txtvxkjpwemafpu.exepid process 3116 File2.exe 812 lvloa.exe 2096 6owe.exe 2112 4aer.exe 1144 startnat.exe 2792 SmartClock.exe 2644 CL_Debug_Log.txt 4448 vxkjpwemafpu.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
lvloa.exe4aer.exeSmartClock.exestartnat.exe6owe.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion startnat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6owe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6owe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4aer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion startnat.exe -
Drops startup file 1 IoCs
Processes:
4aer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4aer.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4aer.exestartnat.exeSmartClock.exelvloa.exe6owe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 4aer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine startnat.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine lvloa.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Wine 6owe.exe -
Loads dropped DLL 5 IoCs
Processes:
File2.exerundll32.exeRUNDLL32.EXEpid process 3116 File2.exe 4488 rundll32.exe 4488 rundll32.exe 4540 RUNDLL32.EXE 4540 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
lvloa.exe6owe.exe4aer.exestartnat.exeSmartClock.exepid process 812 lvloa.exe 2096 6owe.exe 2112 4aer.exe 1144 startnat.exe 2792 SmartClock.exe -
Drops file in Program Files directory 8 IoCs
Processes:
File2.exedescription ioc process File created C:\Program Files (x86)\solfer\Microsoft.IdentityServer.Web.Resources.dll File2.exe File created C:\Program Files (x86)\solfer\4aer.exe File2.exe File created C:\Program Files (x86)\solfer\6owe.exe File2.exe File created C:\Program Files (x86)\solfer\startnat.exe File2.exe File created C:\Program Files (x86)\solfer\boleroh\msdasc.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\msorcl32.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\lvloa.exe File2.exe File created C:\Program Files (x86)\solfer\wiatrace.log File2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
2626e0990d2db399b35b6e357fd53ed1.exelvloa.exeRUNDLL32.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2626e0990d2db399b35b6e357fd53ed1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lvloa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lvloa.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2626e0990d2db399b35b6e357fd53ed1.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 1188 timeout.exe 3740 timeout.exe 4188 timeout.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings cmd.exe -
Processes:
WScript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 2792 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
lvloa.exe6owe.exe4aer.exestartnat.exeSmartClock.exepowershell.exeRUNDLL32.EXEpowershell.exepid process 812 lvloa.exe 812 lvloa.exe 2096 6owe.exe 2096 6owe.exe 2112 4aer.exe 2112 4aer.exe 1144 startnat.exe 1144 startnat.exe 2792 SmartClock.exe 2792 SmartClock.exe 4712 powershell.exe 4712 powershell.exe 4712 powershell.exe 4540 RUNDLL32.EXE 4540 RUNDLL32.EXE 4140 powershell.exe 4140 powershell.exe 4140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
CL_Debug_Log.txtrundll32.exeRUNDLL32.EXEpowershell.exepowershell.exedescription pid process Token: SeRestorePrivilege 2644 CL_Debug_Log.txt Token: 35 2644 CL_Debug_Log.txt Token: SeSecurityPrivilege 2644 CL_Debug_Log.txt Token: SeSecurityPrivilege 2644 CL_Debug_Log.txt Token: SeDebugPrivilege 4488 rundll32.exe Token: SeDebugPrivilege 4540 RUNDLL32.EXE Token: SeDebugPrivilege 4712 powershell.exe Token: SeDebugPrivilege 4140 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
2626e0990d2db399b35b6e357fd53ed1.exestartnat.exeRUNDLL32.EXEpid process 1028 2626e0990d2db399b35b6e357fd53ed1.exe 1028 2626e0990d2db399b35b6e357fd53ed1.exe 1144 startnat.exe 1144 startnat.exe 1144 startnat.exe 4540 RUNDLL32.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
startnat.exepid process 1144 startnat.exe 1144 startnat.exe 1144 startnat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2626e0990d2db399b35b6e357fd53ed1.execmd.exeFile2.exe4aer.exestartnat.exe6owe.execmd.execmd.execmd.exelvloa.execmd.exevxkjpwemafpu.exerundll32.exeRUNDLL32.EXEcmd.exedescription pid process target process PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe File2.exe PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe File2.exe PID 1028 wrote to memory of 3116 1028 2626e0990d2db399b35b6e357fd53ed1.exe File2.exe PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe cmd.exe PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe cmd.exe PID 1028 wrote to memory of 3888 1028 2626e0990d2db399b35b6e357fd53ed1.exe cmd.exe PID 3888 wrote to memory of 1188 3888 cmd.exe timeout.exe PID 3888 wrote to memory of 1188 3888 cmd.exe timeout.exe PID 3888 wrote to memory of 1188 3888 cmd.exe timeout.exe PID 3116 wrote to memory of 812 3116 File2.exe lvloa.exe PID 3116 wrote to memory of 812 3116 File2.exe lvloa.exe PID 3116 wrote to memory of 812 3116 File2.exe lvloa.exe PID 3116 wrote to memory of 2096 3116 File2.exe 6owe.exe PID 3116 wrote to memory of 2096 3116 File2.exe 6owe.exe PID 3116 wrote to memory of 2096 3116 File2.exe 6owe.exe PID 3116 wrote to memory of 2112 3116 File2.exe 4aer.exe PID 3116 wrote to memory of 2112 3116 File2.exe 4aer.exe PID 3116 wrote to memory of 2112 3116 File2.exe 4aer.exe PID 3116 wrote to memory of 1144 3116 File2.exe startnat.exe PID 3116 wrote to memory of 1144 3116 File2.exe startnat.exe PID 3116 wrote to memory of 1144 3116 File2.exe startnat.exe PID 2112 wrote to memory of 2792 2112 4aer.exe SmartClock.exe PID 2112 wrote to memory of 2792 2112 4aer.exe SmartClock.exe PID 2112 wrote to memory of 2792 2112 4aer.exe SmartClock.exe PID 1144 wrote to memory of 2644 1144 startnat.exe CL_Debug_Log.txt PID 1144 wrote to memory of 2644 1144 startnat.exe CL_Debug_Log.txt PID 1144 wrote to memory of 2644 1144 startnat.exe CL_Debug_Log.txt PID 2096 wrote to memory of 3880 2096 6owe.exe cmd.exe PID 2096 wrote to memory of 3880 2096 6owe.exe cmd.exe PID 2096 wrote to memory of 3880 2096 6owe.exe cmd.exe PID 3880 wrote to memory of 3740 3880 cmd.exe timeout.exe PID 3880 wrote to memory of 3740 3880 cmd.exe timeout.exe PID 3880 wrote to memory of 3740 3880 cmd.exe timeout.exe PID 1144 wrote to memory of 4100 1144 startnat.exe cmd.exe PID 1144 wrote to memory of 4100 1144 startnat.exe cmd.exe PID 1144 wrote to memory of 4100 1144 startnat.exe cmd.exe PID 2096 wrote to memory of 4112 2096 6owe.exe cmd.exe PID 2096 wrote to memory of 4112 2096 6owe.exe cmd.exe PID 2096 wrote to memory of 4112 2096 6owe.exe cmd.exe PID 4112 wrote to memory of 4188 4112 cmd.exe timeout.exe PID 4112 wrote to memory of 4188 4112 cmd.exe timeout.exe PID 4112 wrote to memory of 4188 4112 cmd.exe timeout.exe PID 4100 wrote to memory of 4208 4100 cmd.exe schtasks.exe PID 4100 wrote to memory of 4208 4100 cmd.exe schtasks.exe PID 4100 wrote to memory of 4208 4100 cmd.exe schtasks.exe PID 812 wrote to memory of 4404 812 lvloa.exe cmd.exe PID 812 wrote to memory of 4404 812 lvloa.exe cmd.exe PID 812 wrote to memory of 4404 812 lvloa.exe cmd.exe PID 4404 wrote to memory of 4448 4404 cmd.exe vxkjpwemafpu.exe PID 4404 wrote to memory of 4448 4404 cmd.exe vxkjpwemafpu.exe PID 4404 wrote to memory of 4448 4404 cmd.exe vxkjpwemafpu.exe PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe rundll32.exe PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe rundll32.exe PID 4448 wrote to memory of 4488 4448 vxkjpwemafpu.exe rundll32.exe PID 4488 wrote to memory of 4540 4488 rundll32.exe RUNDLL32.EXE PID 4488 wrote to memory of 4540 4488 rundll32.exe RUNDLL32.EXE PID 4488 wrote to memory of 4540 4488 rundll32.exe RUNDLL32.EXE PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE powershell.exe PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE powershell.exe PID 4540 wrote to memory of 4712 4540 RUNDLL32.EXE powershell.exe PID 812 wrote to memory of 4920 812 lvloa.exe cmd.exe PID 812 wrote to memory of 4920 812 lvloa.exe cmd.exe PID 812 wrote to memory of 4920 812 lvloa.exe cmd.exe PID 4920 wrote to memory of 4992 4920 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\File2.exe"C:\Users\Admin\AppData\Local\Temp\File2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\solfer\boleroh\lvloa.exe"C:\Program Files (x86)\solfer\boleroh\lvloa.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"C:\Users\Admin\AppData\Local\Temp\vxkjpwemafpu.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.EXE6⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\VXKJPW~1.DLL,pVRRLDYDBQ==7⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1C82.tmp.ps1"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp2F8F.tmp.ps1"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost9⤵PID:4104
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask8⤵PID:2544
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\swuvjmhjiy.vbs"4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\swuvjmhjiy.vbs"5⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4992
-
-
-
-
C:\Program Files (x86)\solfer\6owe.exe"C:\Program Files (x86)\solfer\6owe.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\xjunxludo & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\xjunxludo & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6owe.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4188
-
-
-
-
C:\Program Files (x86)\solfer\4aer.exe"C:\Program Files (x86)\solfer\4aer.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Program Files (x86)\solfer\startnat.exe"C:\Program Files (x86)\solfer\startnat.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
PID:4208
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rKATlsug0 & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2626e0990d2db399b35b6e357fd53ed1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1188
-
-