Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/01/2021, 22:47
210109-b1v8zws832 9Analysis
-
max time kernel
120s -
max time network
56s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09/01/2021, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe
-
Size
610KB
-
MD5
d83cd7278c47f4f3c7884eb9593a256c
-
SHA1
026983b49e5356ed0497109de09ea43e5be9e54c
-
SHA256
9986d7d421e26cce5a64a65a7f72b757043cbe7dfe2dd0b32f66d25203922415
-
SHA512
5b84ede84c3c76795e45dcc1cc8e186be3f09d03f4965c8b88bda8294f2c0b9983dde4b37532773b07cafe3a1483c8aedd4c4230dbdc06714c5c7c097386fa1b
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 8 IoCs
flow pid Process 25 2668 RUNDLL32.EXE 26 2668 RUNDLL32.EXE 27 2668 RUNDLL32.EXE 30 2860 WScript.exe 32 2860 WScript.exe 34 2860 WScript.exe 36 2860 WScript.exe 38 2860 WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 636 File35.exe 1992 4_ico.exe 1320 6_ico.exe 1712 vpn_ico.exe 2156 SmartClock.exe 2488 qohnagxl.exe -
resource yara_rule behavioral1/files/0x00040000000130e9-69.dat upx behavioral1/files/0x00040000000130e9-70.dat upx behavioral1/files/0x00040000000130e9-72.dat upx behavioral1/files/0x00040000000130e9-75.dat upx behavioral1/files/0x00040000000130e9-74.dat upx behavioral1/files/0x00040000000130e9-73.dat upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpn_ico.exe -
Deletes itself 1 IoCs
pid Process 972 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4_ico.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine SmartClock.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine 4_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine 6_ico.exe Key opened \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Wine vpn_ico.exe -
Loads dropped DLL 34 IoCs
pid Process 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 636 File35.exe 636 File35.exe 636 File35.exe 636 File35.exe 636 File35.exe 636 File35.exe 636 File35.exe 1992 4_ico.exe 1992 4_ico.exe 1992 4_ico.exe 1320 6_ico.exe 1320 6_ico.exe 636 File35.exe 1712 vpn_ico.exe 1712 vpn_ico.exe 1992 4_ico.exe 1992 4_ico.exe 1992 4_ico.exe 2156 SmartClock.exe 2156 SmartClock.exe 2156 SmartClock.exe 1712 vpn_ico.exe 1712 vpn_ico.exe 2488 qohnagxl.exe 2488 qohnagxl.exe 2584 rundll32.exe 2584 rundll32.exe 2584 rundll32.exe 2584 rundll32.exe 2668 RUNDLL32.EXE 2668 RUNDLL32.EXE 2668 RUNDLL32.EXE 2668 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AT22T7OH\desktop.ini RUNDLL32.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXBH52U7\desktop.ini RUNDLL32.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1320 6_ico.exe 1992 4_ico.exe 1712 vpn_ico.exe 2156 SmartClock.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn_ico.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 440 timeout.exe 2300 timeout.exe 2464 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 vpn_ico.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 vpn_ico.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2156 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1320 6_ico.exe 1992 4_ico.exe 1712 vpn_ico.exe 2156 SmartClock.exe 2988 powershell.exe 2988 powershell.exe 2668 RUNDLL32.EXE 2668 RUNDLL32.EXE 1616 powershell.exe 1616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2584 rundll32.exe Token: SeDebugPrivilege 2668 RUNDLL32.EXE Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 2668 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 141 IoCs
description pid Process procid_target PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 636 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 31 PID 1584 wrote to memory of 972 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 33 PID 1584 wrote to memory of 972 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 33 PID 1584 wrote to memory of 972 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 33 PID 1584 wrote to memory of 972 1584 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 33 PID 972 wrote to memory of 440 972 cmd.exe 34 PID 972 wrote to memory of 440 972 cmd.exe 34 PID 972 wrote to memory of 440 972 cmd.exe 34 PID 972 wrote to memory of 440 972 cmd.exe 34 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1992 636 File35.exe 35 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1320 636 File35.exe 37 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 636 wrote to memory of 1712 636 File35.exe 36 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1992 wrote to memory of 2156 1992 4_ico.exe 38 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 1320 wrote to memory of 2224 1320 6_ico.exe 39 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 2224 wrote to memory of 2300 2224 cmd.exe 41 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 1320 wrote to memory of 2320 1320 6_ico.exe 42 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 2320 wrote to memory of 2464 2320 cmd.exe 44 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2488 1712 vpn_ico.exe 45 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 1712 wrote to memory of 2536 1712 vpn_ico.exe 46 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2488 wrote to memory of 2584 2488 qohnagxl.exe 48 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 2584 wrote to memory of 2668 2584 rundll32.exe 49 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 1712 wrote to memory of 2860 1712 vpn_ico.exe 50 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 2988 2668 RUNDLL32.EXE 51 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 2668 wrote to memory of 1616 2668 RUNDLL32.EXE 54 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 1616 wrote to memory of 2276 1616 powershell.exe 56 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1528 2668 RUNDLL32.EXE 57 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59 PID 2668 wrote to memory of 1732 2668 RUNDLL32.EXE 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\File35.exe"C:\Users\Admin\AppData\Local\Temp\File35.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\qohnagxl.exe"C:\Users\Admin\AppData\Local\Temp\qohnagxl.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\QOHNAG~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\qohnagxl.exe5⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\QOHNAG~1.DLL,fiRaLDYCA5g=6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB319.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpD0E8.tmp.ps1"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost8⤵PID:2276
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:1528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask7⤵PID:1732
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mawbuofejlg.vbs"4⤵PID:2536
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jlkqwbekk.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2860
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\cbheeip & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\cbheeip & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵PID:2320
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:2464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\TtbzQgpfv & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:440
-
-