Analysis
-
max time kernel
17s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe
-
Size
5.2MB
-
MD5
ca3728b14865976c4f39d4b1dd058d4b
-
SHA1
41f57c0b052b0ac3a276463f6c09085efb049153
-
SHA256
829a3cefee8046496eb6bc03b2009891bec987a01ebe652bacc42292cf892418
-
SHA512
eabceb4164f54c8332da402ec6f5b91776dedc1b2a4ea1491217a3fed1d4f54bde5863605cbec7910f04f4265a2a9ae8b6dd95aad0ba3dba1ec6a0a26ee217e9
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/4916-134-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4916-135-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/4916-137-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4916-149-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 12 IoCs
pid Process 3688 keygen-pr.exe 4020 keygen-step-1.exe 2080 keygen-step-3.exe 200 keygen-step-4.exe 740 key.exe 2316 Setup.exe 1200 multitimer.exe 1612 setups.exe 3808 askinstall20.exe 3816 setups.tmp 3556 Full_Version.exe 2516 file.exe -
Loads dropped DLL 7 IoCs
pid Process 3816 setups.tmp 3816 setups.tmp 3816 setups.tmp 3816 setups.tmp 3816 setups.tmp 3816 setups.tmp 3816 setups.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 111 ipinfo.io 113 ipinfo.io -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\unins0000.dll Full_Version.exe File created C:\Program Files\unins.vbs Full_Version.exe File created C:\Program Files\unins0000.dat Full_Version.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3276 taskkill.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings Full_Version.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e askinstall20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2772 PING.EXE 4536 PING.EXE 6068 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 112 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 115 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3816 setups.tmp 3816 setups.tmp -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2316 Setup.exe Token: SeCreateTokenPrivilege 3808 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 3808 askinstall20.exe Token: SeLockMemoryPrivilege 3808 askinstall20.exe Token: SeIncreaseQuotaPrivilege 3808 askinstall20.exe Token: SeMachineAccountPrivilege 3808 askinstall20.exe Token: SeTcbPrivilege 3808 askinstall20.exe Token: SeSecurityPrivilege 3808 askinstall20.exe Token: SeTakeOwnershipPrivilege 3808 askinstall20.exe Token: SeLoadDriverPrivilege 3808 askinstall20.exe Token: SeSystemProfilePrivilege 3808 askinstall20.exe Token: SeSystemtimePrivilege 3808 askinstall20.exe Token: SeProfSingleProcessPrivilege 3808 askinstall20.exe Token: SeIncBasePriorityPrivilege 3808 askinstall20.exe Token: SeCreatePagefilePrivilege 3808 askinstall20.exe Token: SeCreatePermanentPrivilege 3808 askinstall20.exe Token: SeBackupPrivilege 3808 askinstall20.exe Token: SeRestorePrivilege 3808 askinstall20.exe Token: SeShutdownPrivilege 3808 askinstall20.exe Token: SeDebugPrivilege 3808 askinstall20.exe Token: SeAuditPrivilege 3808 askinstall20.exe Token: SeSystemEnvironmentPrivilege 3808 askinstall20.exe Token: SeChangeNotifyPrivilege 3808 askinstall20.exe Token: SeRemoteShutdownPrivilege 3808 askinstall20.exe Token: SeUndockPrivilege 3808 askinstall20.exe Token: SeSyncAgentPrivilege 3808 askinstall20.exe Token: SeEnableDelegationPrivilege 3808 askinstall20.exe Token: SeManageVolumePrivilege 3808 askinstall20.exe Token: SeImpersonatePrivilege 3808 askinstall20.exe Token: SeCreateGlobalPrivilege 3808 askinstall20.exe Token: 31 3808 askinstall20.exe Token: 32 3808 askinstall20.exe Token: 33 3808 askinstall20.exe Token: 34 3808 askinstall20.exe Token: 35 3808 askinstall20.exe Token: SeDebugPrivilege 3276 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1612 setups.exe 3816 setups.tmp 2792 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3112 3584 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 75 PID 3584 wrote to memory of 3112 3584 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 75 PID 3584 wrote to memory of 3112 3584 Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe 75 PID 3112 wrote to memory of 3688 3112 cmd.exe 78 PID 3112 wrote to memory of 3688 3112 cmd.exe 78 PID 3112 wrote to memory of 3688 3112 cmd.exe 78 PID 3112 wrote to memory of 4020 3112 cmd.exe 79 PID 3112 wrote to memory of 4020 3112 cmd.exe 79 PID 3112 wrote to memory of 4020 3112 cmd.exe 79 PID 3112 wrote to memory of 2080 3112 cmd.exe 80 PID 3112 wrote to memory of 2080 3112 cmd.exe 80 PID 3112 wrote to memory of 2080 3112 cmd.exe 80 PID 3112 wrote to memory of 200 3112 cmd.exe 81 PID 3112 wrote to memory of 200 3112 cmd.exe 81 PID 3112 wrote to memory of 200 3112 cmd.exe 81 PID 3688 wrote to memory of 740 3688 keygen-pr.exe 82 PID 3688 wrote to memory of 740 3688 keygen-pr.exe 82 PID 3688 wrote to memory of 740 3688 keygen-pr.exe 82 PID 200 wrote to memory of 2316 200 keygen-step-4.exe 83 PID 200 wrote to memory of 2316 200 keygen-step-4.exe 83 PID 740 wrote to memory of 3684 740 key.exe 84 PID 740 wrote to memory of 3684 740 key.exe 84 PID 740 wrote to memory of 3684 740 key.exe 84 PID 2080 wrote to memory of 2924 2080 keygen-step-3.exe 85 PID 2080 wrote to memory of 2924 2080 keygen-step-3.exe 85 PID 2080 wrote to memory of 2924 2080 keygen-step-3.exe 85 PID 2924 wrote to memory of 2772 2924 cmd.exe 87 PID 2924 wrote to memory of 2772 2924 cmd.exe 87 PID 2924 wrote to memory of 2772 2924 cmd.exe 87 PID 2316 wrote to memory of 1200 2316 Setup.exe 88 PID 2316 wrote to memory of 1200 2316 Setup.exe 88 PID 2316 wrote to memory of 1612 2316 Setup.exe 89 PID 2316 wrote to memory of 1612 2316 Setup.exe 89 PID 2316 wrote to memory of 1612 2316 Setup.exe 89 PID 200 wrote to memory of 3808 200 keygen-step-4.exe 90 PID 200 wrote to memory of 3808 200 keygen-step-4.exe 90 PID 200 wrote to memory of 3808 200 keygen-step-4.exe 90 PID 1612 wrote to memory of 3816 1612 setups.exe 91 PID 1612 wrote to memory of 3816 1612 setups.exe 91 PID 1612 wrote to memory of 3816 1612 setups.exe 91 PID 3808 wrote to memory of 2324 3808 askinstall20.exe 92 PID 3808 wrote to memory of 2324 3808 askinstall20.exe 92 PID 3808 wrote to memory of 2324 3808 askinstall20.exe 92 PID 2324 wrote to memory of 3276 2324 cmd.exe 94 PID 2324 wrote to memory of 3276 2324 cmd.exe 94 PID 2324 wrote to memory of 3276 2324 cmd.exe 94 PID 200 wrote to memory of 3556 200 keygen-step-4.exe 98 PID 200 wrote to memory of 3556 200 keygen-step-4.exe 98 PID 200 wrote to memory of 3556 200 keygen-step-4.exe 98 PID 3556 wrote to memory of 1920 3556 Full_Version.exe 99 PID 3556 wrote to memory of 1920 3556 Full_Version.exe 99 PID 3556 wrote to memory of 1920 3556 Full_Version.exe 99 PID 200 wrote to memory of 2516 200 keygen-step-4.exe 100 PID 200 wrote to memory of 2516 200 keygen-step-4.exe 100 PID 200 wrote to memory of 2516 200 keygen-step-4.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Usb_Disk_Formatter_3_2_5_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe" 1 3.1617536513.6069a601a0f55 1016⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ZSVFEMS6A5\multitimer.exe" 2 3.1617536513.6069a601a0f557⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\30dx2j2cdlz\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\30dx2j2cdlz\Setup3310.exe" /Verysilent /subid=5778⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\is-K6DTN.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-K6DTN.tmp\Setup3310.tmp" /SL5="$2030A,138429,56832,C:\Users\Admin\AppData\Local\Temp\30dx2j2cdlz\Setup3310.exe" /Verysilent /subid=5779⤵PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\aybt3ddodvq\jhurzcxqaii.exe"C:\Users\Admin\AppData\Local\Temp\aybt3ddodvq\jhurzcxqaii.exe"8⤵PID:5092
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\aybt3ddodvq\jhurzcxqaii.exe"9⤵PID:5900
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:6068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ekxgtdsizdr\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ekxgtdsizdr\cpyrix.exe" /VERYSILENT8⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\c0aqwgd2xqk\vict.exe"C:\Users\Admin\AppData\Local\Temp\c0aqwgd2xqk\vict.exe" /VERYSILENT /id=5358⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\is-TVOTI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-TVOTI.tmp\vict.tmp" /SL5="$10316,870426,780800,C:\Users\Admin\AppData\Local\Temp\c0aqwgd2xqk\vict.exe" /VERYSILENT /id=5359⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\is-I3QIQ.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-I3QIQ.tmp\win1host.exe" 53510⤵PID:5696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ed5ekujyl1a\app.exe"C:\Users\Admin\AppData\Local\Temp\ed5ekujyl1a\app.exe" /8-238⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\k3xm2nohtl0\tdgkz1af5oy.exe"C:\Users\Admin\AppData\Local\Temp\k3xm2nohtl0\tdgkz1af5oy.exe" /ustwo INSTALL8⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\remruj5xx2s\0ko0pe5lygf.exe"C:\Users\Admin\AppData\Local\Temp\remruj5xx2s\0ko0pe5lygf.exe" /VERYSILENT8⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\is-K78L4.tmp\0ko0pe5lygf.tmp"C:\Users\Admin\AppData\Local\Temp\is-K78L4.tmp\0ko0pe5lygf.tmp" /SL5="$10322,2592217,780800,C:\Users\Admin\AppData\Local\Temp\remruj5xx2s\0ko0pe5lygf.exe" /VERYSILENT9⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\is-OHVID.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-OHVID.tmp\winlthsth.exe"10⤵PID:5708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sodaapkudkm\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\sodaapkudkm\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\is-2035Q.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-2035Q.tmp\IBInstaller_97039.tmp" /SL5="$10320,14574507,721408,C:\Users\Admin\AppData\Local\Temp\sodaapkudkm\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5308
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-SOUIO.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5684
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-SOUIO.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\s5ru2415qsb\vpn.exe"C:\Users\Admin\AppData\Local\Temp\s5ru2415qsb\vpn.exe" /silent /subid=4828⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\is-9I87S.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-9I87S.tmp\vpn.tmp" /SL5="$10396,15170975,270336,C:\Users\Admin\AppData\Local\Temp\s5ru2415qsb\vpn.exe" /silent /subid=4829⤵PID:5392
-
-
-
C:\Users\Admin\AppData\Local\Temp\mlsokkm3lor\juut2t3k3ac.exe"C:\Users\Admin\AppData\Local\Temp\mlsokkm3lor\juut2t3k3ac.exe" /quiet SILENT=1 AF=7568⤵PID:6024
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\GSR7JXTP4R\setups.exe"C:\Users\Admin\AppData\Local\Temp\GSR7JXTP4R\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\is-OUF1Q.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-OUF1Q.tmp\setups.tmp" /SL5="$301FE,454998,229376,C:\Users\Admin\AppData\Local\Temp\GSR7JXTP4R\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Roaming\C20D.tmp.exe"C:\Users\Admin\AppData\Roaming\C20D.tmp.exe"5⤵PID:1464
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4804
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4916
-
-
-
C:\Users\Admin\AppData\Roaming\C2F9.tmp.exe"C:\Users\Admin\AppData\Roaming\C2F9.tmp.exe"5⤵PID:4172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:4272
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:3796
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2792
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4312
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4892
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5968
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\f9f143d957a04858ae8ca9c9674cb6f4 /t 5116 /p 48921⤵PID:5988