Resubmissions
12/01/2021, 11:18
210112-grlybxw2l6 8Analysis
-
max time kernel
80s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12/01/2021, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe
Resource
win10v20201028
General
-
Target
0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe
-
Size
1.5MB
-
MD5
50a5e891da27e63d54e68511e48aa026
-
SHA1
87073d85a7ba420b15c8bb9a9e4adc64db2bcfef
-
SHA256
0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6
-
SHA512
6df8811e3e1f6a4110ca3b7c498af13898b46962a30888879180b2f11dda24344a1de4807663d46dd86f7ea11855d08137980cc85fe71e688d082f2f79994909
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 1976 detection.exe 1212 curl_x64.exe 1592 detect_x64.exe 1572 detect_x64.exe 1700 detect_x64.exe 2016 detect_x64.exe 1256 detect_x64.exe 1060 aes_x64.exe 816 curl_x64.exe -
Loads dropped DLL 16 IoCs
pid Process 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe 1976 detection.exe -
JavaScript code in executable 8 IoCs
resource yara_rule js js behavioral1/files/0x00030000000130e9-14.dat js behavioral1/files/0x00030000000130e9-15.dat js behavioral1/files/0x00030000000130e9-17.dat js behavioral1/files/0x00030000000130e9-46.dat js behavioral1/files/0x00030000000130e9-47.dat js behavioral1/files/0x00030000000130e9-49.dat js -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\setuperr.log detect_x64.exe File opened for modification C:\Windows\INF\setupapi.app.log detect_x64.exe File opened for modification C:\Windows\INF\setupapi.app.log detect_x64.exe File opened for modification C:\Windows\setupact.log detect_x64.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "67" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "15" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "93" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BDCDAC1-54C7-11EB-B2E7-DA78EDA9FF87} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000efd0821c7117e2603c6cd8c276a590baf94cb3ea0c0e2f83e59bf64de3531f66000000000e8000000002000020000000eac9beb8f1d735a81903794faddd3a8b5f7e49229642b461282a30c16d0be27f2000000059b69365b1e89fbf50b759bd8cc6ea74d9504a61c6b75e88d650b48b49525acb400000008c249f4475dd870f5023ce3854821797fcfe1d713f8208b6abfaf164ebd8081934fc0247045a41da5c4c1f469377fb65797864ddbc0b85fee7c19b9396f51015 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "93" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "145" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "171" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "93" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "67" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "67" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "145" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "15" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "145" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com\Total = "197" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0273844d4e8d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\touslesdrivers.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.touslesdrivers.com\ = "15" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "317215080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1572 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe Token: SeRestorePrivilege 1592 detect_x64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1184 iexplore.exe 1184 iexplore.exe 772 IEXPLORE.EXE 772 IEXPLORE.EXE 772 IEXPLORE.EXE 772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 92 IoCs
description pid Process procid_target PID 848 wrote to memory of 2020 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 26 PID 848 wrote to memory of 2020 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 26 PID 848 wrote to memory of 2020 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 26 PID 848 wrote to memory of 2020 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 26 PID 848 wrote to memory of 1976 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 28 PID 848 wrote to memory of 1976 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 28 PID 848 wrote to memory of 1976 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 28 PID 848 wrote to memory of 1976 848 0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe 28 PID 2020 wrote to memory of 1728 2020 cmd.exe 30 PID 2020 wrote to memory of 1728 2020 cmd.exe 30 PID 2020 wrote to memory of 1728 2020 cmd.exe 30 PID 2020 wrote to memory of 1728 2020 cmd.exe 30 PID 1728 wrote to memory of 1712 1728 cmd.exe 32 PID 1728 wrote to memory of 1712 1728 cmd.exe 32 PID 1728 wrote to memory of 1712 1728 cmd.exe 32 PID 1728 wrote to memory of 1712 1728 cmd.exe 32 PID 1728 wrote to memory of 1684 1728 cmd.exe 34 PID 1728 wrote to memory of 1684 1728 cmd.exe 34 PID 1728 wrote to memory of 1684 1728 cmd.exe 34 PID 1728 wrote to memory of 1684 1728 cmd.exe 34 PID 1728 wrote to memory of 1336 1728 cmd.exe 33 PID 1728 wrote to memory of 1336 1728 cmd.exe 33 PID 1728 wrote to memory of 1336 1728 cmd.exe 33 PID 1728 wrote to memory of 1336 1728 cmd.exe 33 PID 1728 wrote to memory of 1232 1728 cmd.exe 35 PID 1728 wrote to memory of 1232 1728 cmd.exe 35 PID 1728 wrote to memory of 1232 1728 cmd.exe 35 PID 1728 wrote to memory of 1232 1728 cmd.exe 35 PID 1976 wrote to memory of 1212 1976 detection.exe 36 PID 1976 wrote to memory of 1212 1976 detection.exe 36 PID 1976 wrote to memory of 1212 1976 detection.exe 36 PID 1976 wrote to memory of 1212 1976 detection.exe 36 PID 1976 wrote to memory of 760 1976 detection.exe 38 PID 1976 wrote to memory of 760 1976 detection.exe 38 PID 1976 wrote to memory of 760 1976 detection.exe 38 PID 1976 wrote to memory of 760 1976 detection.exe 38 PID 1976 wrote to memory of 1520 1976 detection.exe 41 PID 1976 wrote to memory of 1520 1976 detection.exe 41 PID 1976 wrote to memory of 1520 1976 detection.exe 41 PID 1976 wrote to memory of 1520 1976 detection.exe 41 PID 1976 wrote to memory of 1776 1976 detection.exe 43 PID 1976 wrote to memory of 1776 1976 detection.exe 43 PID 1976 wrote to memory of 1776 1976 detection.exe 43 PID 1976 wrote to memory of 1776 1976 detection.exe 43 PID 1976 wrote to memory of 1592 1976 detection.exe 44 PID 1976 wrote to memory of 1592 1976 detection.exe 44 PID 1976 wrote to memory of 1592 1976 detection.exe 44 PID 1976 wrote to memory of 1592 1976 detection.exe 44 PID 1976 wrote to memory of 1572 1976 detection.exe 45 PID 1976 wrote to memory of 1572 1976 detection.exe 45 PID 1976 wrote to memory of 1572 1976 detection.exe 45 PID 1976 wrote to memory of 1572 1976 detection.exe 45 PID 1976 wrote to memory of 2016 1976 detection.exe 46 PID 1976 wrote to memory of 2016 1976 detection.exe 46 PID 1976 wrote to memory of 2016 1976 detection.exe 46 PID 1976 wrote to memory of 2016 1976 detection.exe 46 PID 1976 wrote to memory of 1700 1976 detection.exe 47 PID 1976 wrote to memory of 1700 1976 detection.exe 47 PID 1976 wrote to memory of 1700 1976 detection.exe 47 PID 1976 wrote to memory of 1700 1976 detection.exe 47 PID 1976 wrote to memory of 1256 1976 detection.exe 48 PID 1976 wrote to memory of 1256 1976 detection.exe 48 PID 1976 wrote to memory of 1256 1976 detection.exe 48 PID 1976 wrote to memory of 1256 1976 detection.exe 48 PID 1976 wrote to memory of 772 1976 detection.exe 49 PID 1976 wrote to memory of 772 1976 detection.exe 49 PID 1976 wrote to memory of 772 1976 detection.exe 49 PID 1976 wrote to memory of 772 1976 detection.exe 49 PID 1976 wrote to memory of 1060 1976 detection.exe 50 PID 1976 wrote to memory of 1060 1976 detection.exe 50 PID 1976 wrote to memory of 1060 1976 detection.exe 50 PID 1976 wrote to memory of 1060 1976 detection.exe 50 PID 1976 wrote to memory of 816 1976 detection.exe 51 PID 1976 wrote to memory of 816 1976 detection.exe 51 PID 1976 wrote to memory of 816 1976 detection.exe 51 PID 1976 wrote to memory of 816 1976 detection.exe 51 PID 1976 wrote to memory of 1696 1976 detection.exe 52 PID 1976 wrote to memory of 1696 1976 detection.exe 52 PID 1976 wrote to memory of 1696 1976 detection.exe 52 PID 1976 wrote to memory of 1696 1976 detection.exe 52 PID 1976 wrote to memory of 1412 1976 detection.exe 53 PID 1976 wrote to memory of 1412 1976 detection.exe 53 PID 1976 wrote to memory of 1412 1976 detection.exe 53 PID 1976 wrote to memory of 1412 1976 detection.exe 53 PID 1696 wrote to memory of 1184 1696 cmd.exe 54 PID 1696 wrote to memory of 1184 1696 cmd.exe 54 PID 1696 wrote to memory of 1184 1696 cmd.exe 54 PID 1696 wrote to memory of 1184 1696 cmd.exe 54 PID 1184 wrote to memory of 772 1184 iexplore.exe 56 PID 1184 wrote to memory of 772 1184 iexplore.exe 56 PID 1184 wrote to memory of 772 1184 iexplore.exe 56 PID 1184 wrote to memory of 772 1184 iexplore.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe"C:\Users\Admin\AppData\Local\Temp\0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C START "" "C:\Users\Admin\AppData\Local\Temp\interface.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\interface.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\mode.comMODE CON: COLS=76 LINES=154⤵PID:1712
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I /R /C:"version 5\.[0-1]\."4⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "4⤵PID:1684
-
-
C:\Windows\SysWOW64\waitfor.exeWAITFOR unlock4⤵PID:1232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\detection.exe"C:\Users\Admin\AppData\Local\Temp\detection.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\curl_x64.exe"C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request GET "https://www.touslesdrivers.com/php/mes_drivers/version.php?v_version=3.0.4"3⤵
- Executes dropped EXE
PID:1212
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S EIDQHRRL /SI unlock3⤵PID:760
-
-
C:\Windows\SysWOW64\SC.exeSC query Winmgmt3⤵PID:1520
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S EIDQHRRL /SI unlock3⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" driverfiles 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" drivernodes 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" hwids 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" stack 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" status 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
PID:1256
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S EIDQHRRL /SI unlock3⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\aes_x64.exe"C:\Users\Admin\AppData\Local\Temp\aes_x64.exe" -e -p anT^UpFuzpuC@lOvsoPVe2kiNTidaBo<zI]BeaRnU0ResFwAy@dEnuCkUd)hAzOh -o "C:\Users\Admin\AppData\Local\Temp\d4p7vI6in4nJzd2L\d4p7vI6in4nJzd2L" -3⤵
- Executes dropped EXE
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\curl_x64.exe"C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request POST --form "v_configuration=<C:\Users\Admin\AppData\Local\Temp\d4p7vI6in4nJzd2L\d4p7vI6in4nJzd2L" "https://www.touslesdrivers.com/php/mes_drivers/envoi.php?v_id=d4p7vI6in4nJzd2L&v_version=3.0.4"3⤵
- Executes dropped EXE
PID:816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C START "" "http://www.touslesdrivers.com/index.php?v_page=31&v_id=d4p7vI6in4nJzd2L"3⤵PID:1696
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.touslesdrivers.com/index.php?v_page=31&v_id=d4p7vI6in4nJzd2L4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:772
-
-
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S EIDQHRRL /SI unlock3⤵PID:1412
-
-