Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-05-2021 22:54
Behavioral task
behavioral1
Sample
99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe
Resource
win10v20210408
General
-
Target
99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe
-
Size
2.9MB
-
MD5
14e8869c598322275ae390eb2e6f36af
-
SHA1
e904d47a554aea9ea53d85eeaf1d9bac939e9e09
-
SHA256
99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7
-
SHA512
a7017b5be156634afdf218e2b2b50633ba2b27492ddce9fa07bca1ed8237fa981667596a4777864cf475858ab0885f257819bacfe94d321293f6cce6c790d3ff
Malware Config
Extracted
remcos
daya4659.ddns.net:8282
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
Executes dropped EXE 19 IoCs
pid Process 2880 remcos_agent_Protected.exe 2132 remcos_agent_Protected.exe 3416 remcos.exe 3848 remcos.exe 2876 driverquery.exe 1196 sfc.exe 4524 driverquery.exe 4536 driverquery.exe 4664 sfc.exe 4976 sfc.exe 4996 driverquery.exe 5024 driverquery.exe 5036 driverquery.exe 4224 sfc.exe 4336 sfc.exe 4400 driverquery.exe 4392 driverquery.exe 4364 driverquery.exe 4480 sfc.exe -
resource yara_rule behavioral2/memory/3196-118-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3196-121-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-9923 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-9923.exe" 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4024 set thread context of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 2880 set thread context of 2132 2880 remcos_agent_Protected.exe 81 PID 3416 set thread context of 3848 3416 remcos.exe 88 PID 2876 set thread context of 4536 2876 driverquery.exe 103 PID 1196 set thread context of 4664 1196 sfc.exe 106 PID 4996 set thread context of 5036 4996 driverquery.exe 115 PID 4976 set thread context of 4224 4976 sfc.exe 118 PID 4400 set thread context of 4364 4400 driverquery.exe 124 PID 4336 set thread context of 4480 4336 sfc.exe 127 -
HTTP links in PDF interactive object 11 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral2/files/0x000100000001ab0e-139.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-162.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-169.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-190.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-194.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-212.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-214.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-218.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-236.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-238.dat pdf_with_link_action behavioral2/files/0x000100000001ab10-242.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2336 schtasks.exe 4596 schtasks.exe 5096 schtasks.exe 4248 schtasks.exe 4508 schtasks.exe 4532 schtasks.exe 3680 schtasks.exe 4736 schtasks.exe 2144 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings remcos_agent_Protected.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3848 remcos.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3196 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3036 AcroRd32.exe 3848 remcos.exe 3036 AcroRd32.exe 3036 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2880 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 75 PID 4024 wrote to memory of 2880 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 75 PID 4024 wrote to memory of 2880 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 75 PID 4024 wrote to memory of 3036 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 77 PID 4024 wrote to memory of 3036 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 77 PID 4024 wrote to memory of 3036 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 77 PID 4024 wrote to memory of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 4024 wrote to memory of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 4024 wrote to memory of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 4024 wrote to memory of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 4024 wrote to memory of 3196 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 78 PID 4024 wrote to memory of 3680 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 79 PID 4024 wrote to memory of 3680 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 79 PID 4024 wrote to memory of 3680 4024 99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe 79 PID 2880 wrote to memory of 2132 2880 remcos_agent_Protected.exe 81 PID 2880 wrote to memory of 2132 2880 remcos_agent_Protected.exe 81 PID 2880 wrote to memory of 2132 2880 remcos_agent_Protected.exe 81 PID 2880 wrote to memory of 2132 2880 remcos_agent_Protected.exe 81 PID 2880 wrote to memory of 2132 2880 remcos_agent_Protected.exe 81 PID 2880 wrote to memory of 2336 2880 remcos_agent_Protected.exe 82 PID 2880 wrote to memory of 2336 2880 remcos_agent_Protected.exe 82 PID 2880 wrote to memory of 2336 2880 remcos_agent_Protected.exe 82 PID 2132 wrote to memory of 2504 2132 remcos_agent_Protected.exe 84 PID 2132 wrote to memory of 2504 2132 remcos_agent_Protected.exe 84 PID 2132 wrote to memory of 2504 2132 remcos_agent_Protected.exe 84 PID 2504 wrote to memory of 3464 2504 WScript.exe 85 PID 2504 wrote to memory of 3464 2504 WScript.exe 85 PID 2504 wrote to memory of 3464 2504 WScript.exe 85 PID 3464 wrote to memory of 3416 3464 cmd.exe 87 PID 3464 wrote to memory of 3416 3464 cmd.exe 87 PID 3464 wrote to memory of 3416 3464 cmd.exe 87 PID 3416 wrote to memory of 3848 3416 remcos.exe 88 PID 3416 wrote to memory of 3848 3416 remcos.exe 88 PID 3416 wrote to memory of 3848 3416 remcos.exe 88 PID 3416 wrote to memory of 3848 3416 remcos.exe 88 PID 3416 wrote to memory of 3848 3416 remcos.exe 88 PID 3848 wrote to memory of 200 3848 remcos.exe 89 PID 3848 wrote to memory of 200 3848 remcos.exe 89 PID 3848 wrote to memory of 200 3848 remcos.exe 89 PID 3416 wrote to memory of 2144 3416 remcos.exe 90 PID 3416 wrote to memory of 2144 3416 remcos.exe 90 PID 3416 wrote to memory of 2144 3416 remcos.exe 90 PID 3036 wrote to memory of 3916 3036 AcroRd32.exe 92 PID 3036 wrote to memory of 3916 3036 AcroRd32.exe 92 PID 3036 wrote to memory of 3916 3036 AcroRd32.exe 92 PID 3036 wrote to memory of 3144 3036 AcroRd32.exe 95 PID 3036 wrote to memory of 3144 3036 AcroRd32.exe 95 PID 3036 wrote to memory of 3144 3036 AcroRd32.exe 95 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94 PID 3916 wrote to memory of 1188 3916 RdrCEF.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe"C:\Users\Admin\AppData\Local\Temp\99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵PID:200
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F7⤵
- Creates scheduled task(s)
PID:2144
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2336
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2D224846A73737267DF950F66D441002 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2BF509ED7533F92B625271A09AD3584A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2BF509ED7533F92B625271A09AD3584A --renderer-client-id=2 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job /prefetch:14⤵PID:2432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AD83F96B7459ACFE1A7C8D3CC7FC4F6E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AD83F96B7459ACFE1A7C8D3CC7FC4F6E --renderer-client-id=4 --mojo-platform-channel-handle=2076 --allow-no-sandbox-job /prefetch:14⤵PID:2108
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B8BF8D5F5FFDB1FF39E8F3A715982606 --mojo-platform-channel-handle=2472 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DB24B0EE240D1C86EE3BD2ED27352E05 --mojo-platform-channel-handle=1604 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4324
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BE22E822CEC475824A0417B81B5E3351 --mojo-platform-channel-handle=2492 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4420
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe"C:\Users\Admin\AppData\Local\Temp\99d258fb84b82382de0faa36e57a0bb13eb7c107098ab06c64d88cbf1b8e2db7.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: RenamesItself
PID:3196
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3680
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4524
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4596
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1196 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:4664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4736
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4976 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:4224
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4248
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4996 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:5024
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:5096
-
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4336 -
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
PID:4480
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4532
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4400 -
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
PID:4364
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4508
-