Analysis
-
max time kernel
1594s -
max time network
1768s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-04-2021 13:29
Static task
static1
Behavioral task
behavioral1
Sample
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
Resource
win7v20201028
General
-
Target
DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
-
Size
4.8MB
-
MD5
98e0552e7c661d3f84c5ca691bb58b60
-
SHA1
f8747cbd9256e9587e45b1feeded6b082b098e5d
-
SHA256
23e30d6f1d505e6a0cf1672ec7420d28af81975a9832f1af2eae8a3233a09eb4
-
SHA512
d767b09e6d24ce96ce95e7cbcb248b93373f7dcbad3a96ba249a3c54df9511567c4ff2bfd8393492a0f90ae8bf5ab37c1cf71f75092ad81dde7a7a7a5f7e76da
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral5/memory/2904-134-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral5/memory/2904-135-0x00000001402CA898-mapping.dmp xmrig behavioral5/memory/2904-139-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral5/memory/2904-141-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 137 2904 msiexec.exe -
Executes dropped EXE 34 IoCs
pid Process 1564 keygen-pr.exe 1584 keygen-step-1.exe 1064 keygen-step-3.exe 1520 keygen-step-4.exe 1624 key.exe 1204 Setup.exe 364 key.exe 1884 setups.exe 940 askinstall20.exe 1508 setups.tmp 2164 file.exe 2380 EE66.tmp.exe 2416 EFDE.tmp.exe 2468 F07B.tmp.exe 2692 md2_2efs.exe 2772 EE66.tmp.exe 3112 BTRSetp.exe 3228 7185728.exe 3240 6872105.exe 3268 4085740.exe 3280 5281535.exe 3292 739483.exe 3312 gcttt.exe 3348 jfiag3g_gg.exe 3380 jfiag3g_gg.exe 3692 Windows Host.exe 4068 4085740.exe 4076 4085740.exe 4084 4085740.exe 4092 4085740.exe 3096 4085740.exe 2524 5281535.exe 3136 jfiag3g_gg.exe 2708 jfiag3g_gg.exe -
Loads dropped DLL 54 IoCs
pid Process 1220 cmd.exe 1220 cmd.exe 1220 cmd.exe 1220 cmd.exe 1220 cmd.exe 1564 keygen-pr.exe 1564 keygen-pr.exe 1564 keygen-pr.exe 1564 keygen-pr.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1624 key.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1884 setups.exe 1508 setups.tmp 1508 setups.tmp 1508 setups.tmp 1508 setups.tmp 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 2164 file.exe 2164 file.exe 2164 file.exe 2164 file.exe 2164 file.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 1520 keygen-step-4.exe 3312 gcttt.exe 3312 gcttt.exe 3312 gcttt.exe 3312 gcttt.exe 3240 6872105.exe 3240 6872105.exe 3312 gcttt.exe 3312 gcttt.exe 3312 gcttt.exe 3312 gcttt.exe 2720 regsvr32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run EFDE.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" EFDE.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 6872105.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 104 api.ipify.org 148 ip-api.com -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1624 set thread context of 364 1624 key.exe 38 PID 2380 set thread context of 2772 2380 EE66.tmp.exe 62 PID 2416 set thread context of 1512 2416 EFDE.tmp.exe 64 PID 2416 set thread context of 2904 2416 EFDE.tmp.exe 66 PID 3280 set thread context of 2524 3280 5281535.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EE66.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EE66.tmp.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2152 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 548 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\istripper.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C050B2E1-93C7-11EB-A3A5-424ABE5A776C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000075b6d6841962af42a7da3d5778c1ea2b000000000200000000001066000000010000200000001ae1f1861c88625fcf0780e6160d433c26c75a3c58f6bd44a4215d6e2defec86000000000e80000000020000200000009f32fbd0e15fd933dbfc9610e4a4a61fcc86a0e69910eff7d7dbc574b16d19c62000000016a63c0c811af7dc0a495e9ce7899d04244b042d30bee766a016312bee042ed6400000007c0c337abf4a74232d694f489c34af791fe0815e495ea73ad8be22e1197628e7a02c70deb54375f6b42ce8f1a9c4d5187220103c5791dd84103c2d67189dfca4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "324142145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.istripper.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.istripper.com\ = "51" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\istripper.com\Total = "51" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\istripper.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\onlinecasinoground.nl IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\onlinecasinoground.nl\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7036b99dd427d701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "51" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e file.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2704 PING.EXE 824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1624 key.exe 1624 key.exe 1508 setups.tmp 2772 EE66.tmp.exe 3380 jfiag3g_gg.exe 3292 739483.exe 3228 7185728.exe 3228 7185728.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 3268 4085740.exe 2524 5281535.exe 1508 setups.tmp 1704 iexplore.exe 1508 setups.tmp 1704 iexplore.exe 3136 jfiag3g_gg.exe 1508 setups.tmp 1704 iexplore.exe 1508 setups.tmp 1704 iexplore.exe 1704 iexplore.exe 2708 jfiag3g_gg.exe 1508 setups.tmp 2124 IEXPLORE.EXE 1704 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1204 Setup.exe Token: SeCreateTokenPrivilege 940 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 940 askinstall20.exe Token: SeLockMemoryPrivilege 940 askinstall20.exe Token: SeIncreaseQuotaPrivilege 940 askinstall20.exe Token: SeMachineAccountPrivilege 940 askinstall20.exe Token: SeTcbPrivilege 940 askinstall20.exe Token: SeSecurityPrivilege 940 askinstall20.exe Token: SeTakeOwnershipPrivilege 940 askinstall20.exe Token: SeLoadDriverPrivilege 940 askinstall20.exe Token: SeSystemProfilePrivilege 940 askinstall20.exe Token: SeSystemtimePrivilege 940 askinstall20.exe Token: SeProfSingleProcessPrivilege 940 askinstall20.exe Token: SeIncBasePriorityPrivilege 940 askinstall20.exe Token: SeCreatePagefilePrivilege 940 askinstall20.exe Token: SeCreatePermanentPrivilege 940 askinstall20.exe Token: SeBackupPrivilege 940 askinstall20.exe Token: SeRestorePrivilege 940 askinstall20.exe Token: SeShutdownPrivilege 940 askinstall20.exe Token: SeDebugPrivilege 940 askinstall20.exe Token: SeAuditPrivilege 940 askinstall20.exe Token: SeSystemEnvironmentPrivilege 940 askinstall20.exe Token: SeChangeNotifyPrivilege 940 askinstall20.exe Token: SeRemoteShutdownPrivilege 940 askinstall20.exe Token: SeUndockPrivilege 940 askinstall20.exe Token: SeSyncAgentPrivilege 940 askinstall20.exe Token: SeEnableDelegationPrivilege 940 askinstall20.exe Token: SeManageVolumePrivilege 940 askinstall20.exe Token: SeImpersonatePrivilege 940 askinstall20.exe Token: SeCreateGlobalPrivilege 940 askinstall20.exe Token: 31 940 askinstall20.exe Token: 32 940 askinstall20.exe Token: 33 940 askinstall20.exe Token: 34 940 askinstall20.exe Token: 35 940 askinstall20.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeImpersonatePrivilege 1624 key.exe Token: SeTcbPrivilege 1624 key.exe Token: SeChangeNotifyPrivilege 1624 key.exe Token: SeCreateTokenPrivilege 1624 key.exe Token: SeBackupPrivilege 1624 key.exe Token: SeRestorePrivilege 1624 key.exe Token: SeIncreaseQuotaPrivilege 1624 key.exe Token: SeAssignPrimaryTokenPrivilege 1624 key.exe Token: SeImpersonatePrivilege 1624 key.exe Token: SeTcbPrivilege 1624 key.exe Token: SeChangeNotifyPrivilege 1624 key.exe Token: SeCreateTokenPrivilege 1624 key.exe Token: SeBackupPrivilege 1624 key.exe Token: SeRestorePrivilege 1624 key.exe Token: SeIncreaseQuotaPrivilege 1624 key.exe Token: SeAssignPrimaryTokenPrivilege 1624 key.exe Token: SeImpersonatePrivilege 1624 key.exe Token: SeTcbPrivilege 1624 key.exe Token: SeChangeNotifyPrivilege 1624 key.exe Token: SeCreateTokenPrivilege 1624 key.exe Token: SeBackupPrivilege 1624 key.exe Token: SeRestorePrivilege 1624 key.exe Token: SeIncreaseQuotaPrivilege 1624 key.exe Token: SeAssignPrimaryTokenPrivilege 1624 key.exe Token: SeImpersonatePrivilege 1624 key.exe Token: SeTcbPrivilege 1624 key.exe Token: SeChangeNotifyPrivilege 1624 key.exe Token: SeCreateTokenPrivilege 1624 key.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 3492 IEXPLORE.EXE 3492 IEXPLORE.EXE 3492 IEXPLORE.EXE 3492 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1220 1668 DBF.Viewer.Pro.3.11.crack.by.F4CG.exe 29 PID 1668 wrote to memory of 1220 1668 DBF.Viewer.Pro.3.11.crack.by.F4CG.exe 29 PID 1668 wrote to memory of 1220 1668 DBF.Viewer.Pro.3.11.crack.by.F4CG.exe 29 PID 1668 wrote to memory of 1220 1668 DBF.Viewer.Pro.3.11.crack.by.F4CG.exe 29 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1564 1220 cmd.exe 31 PID 1220 wrote to memory of 1584 1220 cmd.exe 32 PID 1220 wrote to memory of 1584 1220 cmd.exe 32 PID 1220 wrote to memory of 1584 1220 cmd.exe 32 PID 1220 wrote to memory of 1584 1220 cmd.exe 32 PID 1220 wrote to memory of 1064 1220 cmd.exe 33 PID 1220 wrote to memory of 1064 1220 cmd.exe 33 PID 1220 wrote to memory of 1064 1220 cmd.exe 33 PID 1220 wrote to memory of 1064 1220 cmd.exe 33 PID 1220 wrote to memory of 1520 1220 cmd.exe 34 PID 1220 wrote to memory of 1520 1220 cmd.exe 34 PID 1220 wrote to memory of 1520 1220 cmd.exe 34 PID 1220 wrote to memory of 1520 1220 cmd.exe 34 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1564 wrote to memory of 1624 1564 keygen-pr.exe 35 PID 1520 wrote to memory of 1204 1520 keygen-step-4.exe 36 PID 1520 wrote to memory of 1204 1520 keygen-step-4.exe 36 PID 1520 wrote to memory of 1204 1520 keygen-step-4.exe 36 PID 1520 wrote to memory of 1204 1520 keygen-step-4.exe 36 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1624 wrote to memory of 364 1624 key.exe 38 PID 1064 wrote to memory of 1804 1064 keygen-step-3.exe 40 PID 1064 wrote to memory of 1804 1064 keygen-step-3.exe 40 PID 1064 wrote to memory of 1804 1064 keygen-step-3.exe 40 PID 1064 wrote to memory of 1804 1064 keygen-step-3.exe 40 PID 1804 wrote to memory of 824 1804 cmd.exe 42 PID 1804 wrote to memory of 824 1804 cmd.exe 42 PID 1804 wrote to memory of 824 1804 cmd.exe 42 PID 1804 wrote to memory of 824 1804 cmd.exe 42 PID 1204 wrote to memory of 1884 1204 Setup.exe 46 PID 1204 wrote to memory of 1884 1204 Setup.exe 46 PID 1204 wrote to memory of 1884 1204 Setup.exe 46 PID 1204 wrote to memory of 1884 1204 Setup.exe 46 PID 1204 wrote to memory of 1884 1204 Setup.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBF.Viewer.Pro.3.11.crack.by.F4CG.exe"C:\Users\Admin\AppData\Local\Temp\DBF.Viewer.Pro.3.11.crack.by.F4CG.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe"C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe" ll5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\is-O47II.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-O47II.tmp\setups.tmp" /SL5="$201B6,635399,250368,C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://catser.inappapiurl.com/redirect/57a764d042bf8/7⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:1389580 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:1324066 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:472105 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275489 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\260824873.exe"9⤵
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe10⤵PID:2328
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:865358 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:848
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2164 -
C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2380 -
C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
-
C:\Users\Admin\AppData\Roaming\EFDE.tmp.exe"C:\Users\Admin\AppData\Roaming\EFDE.tmp.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2416 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:1512
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
PID:2904
-
-
-
C:\Users\Admin\AppData\Roaming\F07B.tmp.exe"C:\Users\Admin\AppData\Roaming\F07B.tmp.exe"5⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\F07B.tmp.exe6⤵PID:2104
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2152
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:3112 -
C:\ProgramData\7185728.exe"C:\ProgramData\7185728.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\ProgramData\6872105.exe"C:\ProgramData\6872105.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3240 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
PID:3692
-
-
-
C:\ProgramData\4085740.exe"C:\ProgramData\4085740.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3268 -
C:\ProgramData\4085740.exe"{path}"6⤵
- Executes dropped EXE
PID:4068
-
-
C:\ProgramData\4085740.exe"{path}"6⤵
- Executes dropped EXE
PID:4092
-
-
C:\ProgramData\4085740.exe"{path}"6⤵
- Executes dropped EXE
PID:3096
-
-
C:\ProgramData\4085740.exe"{path}"6⤵
- Executes dropped EXE
PID:4084
-
-
C:\ProgramData\4085740.exe"{path}"6⤵
- Executes dropped EXE
PID:4076
-
-
-
C:\ProgramData\5281535.exe"C:\ProgramData\5281535.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3280 -
C:\ProgramData\5281535.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
-
C:\ProgramData\739483.exe"C:\ProgramData\739483.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.11⤵
- Runs ping.exe
PID:2704