Analysis
-
max time kernel
10s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 23:08
Static task
static1
Behavioral task
behavioral1
Sample
Diagbox_Update_V7_49_To_V7_53_serials_generator.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Diagbox_Update_V7_49_To_V7_53_serials_generator.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Diagbox_Update_V7_49_To_V7_53_serials_generator.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Diagbox_Update_V7_49_To_V7_53_serials_generator.exe
Resource
win10v20201028
General
-
Target
Diagbox_Update_V7_49_To_V7_53_serials_generator.exe
-
Size
5.2MB
-
MD5
2818372f24cde757ae7266b509b63133
-
SHA1
fa662d9ee2cdbd8ec1d5f8c020eddffaccb384a0
-
SHA256
9e4d675771851eedb84b52478a8dc5f4a8d7d9b0842a6808ec588654b313afbc
-
SHA512
da0333d642b8f9942a8f6b7542ac73772b80bb0c68315da52a19a73e188999dd62e9c205a0a02cc1304232c739572387a689fde6c14f0afc5ef8ff433da93f4e
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral1/memory/5412-198-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral1/memory/5412-199-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral1/memory/5412-196-0x0000000002750000-0x000000000305A000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/5172-144-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/5172-143-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/5172-165-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/5172-219-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
flow pid Process 17 3628 cmd.exe 19 3628 cmd.exe -
Executes dropped EXE 10 IoCs
pid Process 2556 keygen-pr.exe 3328 keygen-step-1.exe 1952 keygen-step-3.exe 3612 keygen-step-4.exe 2608 key.exe 3628 cmd.exe 3808 multitimer.exe 1732 setups.exe 2580 askinstall20.exe 3916 setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 3916 setups.tmp 3916 setups.tmp 3916 setups.tmp 3916 setups.tmp 3916 setups.tmp 3916 setups.tmp 3916 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 131 ipinfo.io 133 ipinfo.io 174 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 3848 taskkill.exe 4228 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e askinstall20.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3548 PING.EXE 2888 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 132 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3916 setups.tmp 3916 setups.tmp -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 3628 cmd.exe Token: SeCreateTokenPrivilege 2580 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2580 askinstall20.exe Token: SeLockMemoryPrivilege 2580 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2580 askinstall20.exe Token: SeMachineAccountPrivilege 2580 askinstall20.exe Token: SeTcbPrivilege 2580 askinstall20.exe Token: SeSecurityPrivilege 2580 askinstall20.exe Token: SeTakeOwnershipPrivilege 2580 askinstall20.exe Token: SeLoadDriverPrivilege 2580 askinstall20.exe Token: SeSystemProfilePrivilege 2580 askinstall20.exe Token: SeSystemtimePrivilege 2580 askinstall20.exe Token: SeProfSingleProcessPrivilege 2580 askinstall20.exe Token: SeIncBasePriorityPrivilege 2580 askinstall20.exe Token: SeCreatePagefilePrivilege 2580 askinstall20.exe Token: SeCreatePermanentPrivilege 2580 askinstall20.exe Token: SeBackupPrivilege 2580 askinstall20.exe Token: SeRestorePrivilege 2580 askinstall20.exe Token: SeShutdownPrivilege 2580 askinstall20.exe Token: SeDebugPrivilege 2580 askinstall20.exe Token: SeAuditPrivilege 2580 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2580 askinstall20.exe Token: SeChangeNotifyPrivilege 2580 askinstall20.exe Token: SeRemoteShutdownPrivilege 2580 askinstall20.exe Token: SeUndockPrivilege 2580 askinstall20.exe Token: SeSyncAgentPrivilege 2580 askinstall20.exe Token: SeEnableDelegationPrivilege 2580 askinstall20.exe Token: SeManageVolumePrivilege 2580 askinstall20.exe Token: SeImpersonatePrivilege 2580 askinstall20.exe Token: SeCreateGlobalPrivilege 2580 askinstall20.exe Token: 31 2580 askinstall20.exe Token: 32 2580 askinstall20.exe Token: 33 2580 askinstall20.exe Token: 34 2580 askinstall20.exe Token: 35 2580 askinstall20.exe Token: SeDebugPrivilege 3848 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 setups.exe 3916 setups.tmp -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 652 wrote to memory of 696 652 Diagbox_Update_V7_49_To_V7_53_serials_generator.exe 77 PID 652 wrote to memory of 696 652 Diagbox_Update_V7_49_To_V7_53_serials_generator.exe 77 PID 652 wrote to memory of 696 652 Diagbox_Update_V7_49_To_V7_53_serials_generator.exe 77 PID 696 wrote to memory of 2556 696 cmd.exe 80 PID 696 wrote to memory of 2556 696 cmd.exe 80 PID 696 wrote to memory of 2556 696 cmd.exe 80 PID 696 wrote to memory of 3328 696 cmd.exe 81 PID 696 wrote to memory of 3328 696 cmd.exe 81 PID 696 wrote to memory of 3328 696 cmd.exe 81 PID 696 wrote to memory of 1952 696 cmd.exe 83 PID 696 wrote to memory of 1952 696 cmd.exe 83 PID 696 wrote to memory of 1952 696 cmd.exe 83 PID 696 wrote to memory of 3612 696 cmd.exe 84 PID 696 wrote to memory of 3612 696 cmd.exe 84 PID 696 wrote to memory of 3612 696 cmd.exe 84 PID 2556 wrote to memory of 2608 2556 keygen-pr.exe 85 PID 2556 wrote to memory of 2608 2556 keygen-pr.exe 85 PID 2556 wrote to memory of 2608 2556 keygen-pr.exe 85 PID 3612 wrote to memory of 3628 3612 keygen-step-4.exe 95 PID 3612 wrote to memory of 3628 3612 keygen-step-4.exe 95 PID 2608 wrote to memory of 3696 2608 key.exe 87 PID 2608 wrote to memory of 3696 2608 key.exe 87 PID 2608 wrote to memory of 3696 2608 key.exe 87 PID 1952 wrote to memory of 1520 1952 keygen-step-3.exe 88 PID 1952 wrote to memory of 1520 1952 keygen-step-3.exe 88 PID 1952 wrote to memory of 1520 1952 keygen-step-3.exe 88 PID 1520 wrote to memory of 3548 1520 cmd.exe 90 PID 1520 wrote to memory of 3548 1520 cmd.exe 90 PID 1520 wrote to memory of 3548 1520 cmd.exe 90 PID 3628 wrote to memory of 3808 3628 cmd.exe 91 PID 3628 wrote to memory of 3808 3628 cmd.exe 91 PID 3628 wrote to memory of 1732 3628 cmd.exe 92 PID 3628 wrote to memory of 1732 3628 cmd.exe 92 PID 3628 wrote to memory of 1732 3628 cmd.exe 92 PID 3612 wrote to memory of 2580 3612 keygen-step-4.exe 93 PID 3612 wrote to memory of 2580 3612 keygen-step-4.exe 93 PID 3612 wrote to memory of 2580 3612 keygen-step-4.exe 93 PID 1732 wrote to memory of 3916 1732 setups.exe 94 PID 1732 wrote to memory of 3916 1732 setups.exe 94 PID 1732 wrote to memory of 3916 1732 setups.exe 94 PID 2580 wrote to memory of 3628 2580 askinstall20.exe 95 PID 2580 wrote to memory of 3628 2580 askinstall20.exe 95 PID 2580 wrote to memory of 3628 2580 askinstall20.exe 95 PID 3628 wrote to memory of 3848 3628 cmd.exe 97 PID 3628 wrote to memory of 3848 3628 cmd.exe 97 PID 3628 wrote to memory of 3848 3628 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Diagbox_Update_V7_49_To_V7_53_serials_generator.exe"C:\Users\Admin\AppData\Local\Temp\Diagbox_Update_V7_49_To_V7_53_serials_generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe" 1 3.1617491339.6068f58b34770 1016⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ME14FZ59N2\multitimer.exe" 2 3.1617491339.6068f58b347707⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\kqy1csmgsmn\vpn.exe"C:\Users\Admin\AppData\Local\Temp\kqy1csmgsmn\vpn.exe" /silent /subid=4828⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\is-DJ9EN.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-DJ9EN.tmp\vpn.tmp" /SL5="$10374,15170975,270336,C:\Users\Admin\AppData\Local\Temp\kqy1csmgsmn\vpn.exe" /silent /subid=4829⤵PID:5644
-
-
-
C:\Users\Admin\AppData\Local\Temp\dotb3x5yxqv\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\dotb3x5yxqv\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\is-G6JAS.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-G6JAS.tmp\IBInstaller_97039.tmp" /SL5="$103E4,14574828,721408,C:\Users\Admin\AppData\Local\Temp\dotb3x5yxqv\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5692
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-T1ST1.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5816
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-T1ST1.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:6040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\n1l2xy1oftl\app.exe"C:\Users\Admin\AppData\Local\Temp\n1l2xy1oftl\app.exe" /8-238⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\hl221vzg5qt\rayj3heap3d.exe"C:\Users\Admin\AppData\Local\Temp\hl221vzg5qt\rayj3heap3d.exe" /ustwo INSTALL8⤵PID:5312
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "rayj3heap3d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\hl221vzg5qt\rayj3heap3d.exe" & exit9⤵PID:4636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "rayj3heap3d.exe" /f10⤵
- Kills process with taskkill
PID:4228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5dpbo4khvvf\100dwfihs5h.exe"C:\Users\Admin\AppData\Local\Temp\5dpbo4khvvf\100dwfihs5h.exe"8⤵PID:5300
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\5dpbo4khvvf\100dwfihs5h.exe"9⤵PID:6136
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:2888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pyuajix1vco\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\pyuajix1vco\Setup3310.exe" /Verysilent /subid=5778⤵PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\zxplau5jkzk\vict.exe"C:\Users\Admin\AppData\Local\Temp\zxplau5jkzk\vict.exe" /VERYSILENT /id=5358⤵PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\pvaz2pz0q1r\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\pvaz2pz0q1r\cpyrix.exe" /VERYSILENT8⤵PID:5264
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:6016
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\bdjcm23olfv\tjf0yn3uxo2.exe"C:\Users\Admin\AppData\Local\Temp\bdjcm23olfv\tjf0yn3uxo2.exe" /VERYSILENT8⤵PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\0vzz5djr3x4\rbvoilg4lrd.exe"C:\Users\Admin\AppData\Local\Temp\0vzz5djr3x4\rbvoilg4lrd.exe" /quiet SILENT=1 AF=7568⤵PID:5852
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\0vzz5djr3x4\rbvoilg4lrd.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\0vzz5djr3x4\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617232254 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5540
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VOF6TC5YMA\setups.exe"C:\Users\Admin\AppData\Local\Temp\VOF6TC5YMA\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\is-R8HGO.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-R8HGO.tmp\setups.tmp" /SL5="$401E2,635399,250368,C:\Users\Admin\AppData\Local\Temp\VOF6TC5YMA\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4688
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4752
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:5012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4836
-
C:\Users\Admin\AppData\Roaming\A05C.tmp.exe"C:\Users\Admin\AppData\Roaming\A05C.tmp.exe"5⤵PID:5052
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4192
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5172
-
-
-
C:\Users\Admin\AppData\Roaming\A3E8.tmp.exe"C:\Users\Admin\AppData\Roaming\A3E8.tmp.exe"5⤵PID:5112
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4220
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4264
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4484
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\is-54CQG.tmp\tjf0yn3uxo2.tmp"C:\Users\Admin\AppData\Local\Temp\is-54CQG.tmp\tjf0yn3uxo2.tmp" /SL5="$10318,2592217,780800,C:\Users\Admin\AppData\Local\Temp\bdjcm23olfv\tjf0yn3uxo2.exe" /VERYSILENT1⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\is-RLF17.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-RLF17.tmp\winlthsth.exe"2⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\is-SH73S.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SH73S.tmp\Setup3310.tmp" /SL5="$B0304,138429,56832,C:\Users\Admin\AppData\Local\Temp\pyuajix1vco\Setup3310.exe" /Verysilent /subid=5771⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\is-F0N8T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-F0N8T.tmp\Setup.exe" /Verysilent2⤵PID:5392
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4632
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:5284
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5764
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\is-VQC0R.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-VQC0R.tmp\LabPicV3.tmp" /SL5="$40164,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:5256
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:5680
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5364
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:3340
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5916
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5860
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\f49msXwaGcZo.exe"3⤵PID:196
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QEJD3.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-QEJD3.tmp\vict.tmp" /SL5="$3030C,870426,780800,C:\Users\Admin\AppData\Local\Temp\zxplau5jkzk\vict.exe" /VERYSILENT /id=5351⤵PID:5492
-
C:\Users\Admin\AppData\Local\Temp\is-CHCKA.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-CHCKA.tmp\win1host.exe" 5352⤵PID:5456
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2144
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9DA0B118FDBB3F6EB4A81AA44040620A C2⤵PID:4820
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\is-960J8.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-960J8.tmp\lylal220.tmp" /SL5="$20460,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"1⤵PID:5988
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\8195ba8b4fcf4cf59c331fa2a4a36ec1 /t 4596 /p 45521⤵PID:5340