Analysis
-
max time kernel
4s -
max time network
82s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-05-2021 21:31
Static task
static1
Behavioral task
behavioral1
Sample
15CC8191E7728032CDABE71FAC938139.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
15CC8191E7728032CDABE71FAC938139.exe
Resource
win10v20210410
General
-
Target
15CC8191E7728032CDABE71FAC938139.exe
-
Size
3.9MB
-
MD5
15cc8191e7728032cdabe71fac938139
-
SHA1
1b23c3637e4ddb26115bd9152525d15b4af73a36
-
SHA256
46e99e70a21a9ecd28e61195f175bea9260eea38b1718f6750166688d955e91e
-
SHA512
c5a77d8d0a94785f2715d023584bc024305326baac85539e3cb53b0ad319da35401a9affd745d4248789970f737fafd3bdf7e059624fe3b61347fb0314cc00f8
Malware Config
Extracted
smokeloader
2020
http://20xbtc.com/upload/
http://yzsnw.com/upload/
http://kaledebiyat.com/upload/
http://expertizizmir.com/upload/
http://dedkndy.com/upload/
http://theuncu.com/upload/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/5536-338-0x000000000041698A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
resource yara_rule behavioral2/files/0x000100000001ab77-115.dat aspack_v212_v242 behavioral2/files/0x000100000001ab77-116.dat aspack_v212_v242 behavioral2/files/0x000200000001ab68-119.dat aspack_v212_v242 behavioral2/files/0x000200000001ab67-120.dat aspack_v212_v242 behavioral2/files/0x000200000001ab68-122.dat aspack_v212_v242 behavioral2/files/0x000200000001ab67-121.dat aspack_v212_v242 behavioral2/files/0x000100000001ab6d-124.dat aspack_v212_v242 behavioral2/files/0x000100000001ab6d-125.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 1788 setup_install.exe 360 metina_1.exe 3408 metina_3.exe 2072 metina_5.exe 3660 metina_4.exe 2144 metina_2.exe 4104 metina_6.exe 4172 FNaHqxLJoVZAeSmvWEiyM7mp.exe 4224 metina_7.exe 4240 metina_8.exe 4332 jfiag3g_gg.exe -
resource yara_rule behavioral2/files/0x000100000001ab7f-187.dat upx behavioral2/files/0x000100000001ab7f-186.dat upx behavioral2/files/0x000100000001aba2-308.dat upx behavioral2/files/0x000100000001aba2-306.dat upx -
Loads dropped DLL 8 IoCs
pid Process 1788 setup_install.exe 1788 setup_install.exe 1788 setup_install.exe 1788 setup_install.exe 1788 setup_install.exe 1788 setup_install.exe 1788 setup_install.exe 4172 FNaHqxLJoVZAeSmvWEiyM7mp.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com 64 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4788 5060 WerFault.exe 108 6112 5060 WerFault.exe 108 2240 5060 WerFault.exe 108 732 5060 WerFault.exe 108 3084 5060 WerFault.exe 108 6224 5772 WerFault.exe 133 6416 5772 WerFault.exe 133 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5152 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5028 PING.EXE 4484 PING.EXE -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1788 2204 15CC8191E7728032CDABE71FAC938139.exe 74 PID 2204 wrote to memory of 1788 2204 15CC8191E7728032CDABE71FAC938139.exe 74 PID 2204 wrote to memory of 1788 2204 15CC8191E7728032CDABE71FAC938139.exe 74 PID 1788 wrote to memory of 4036 1788 setup_install.exe 79 PID 1788 wrote to memory of 4036 1788 setup_install.exe 79 PID 1788 wrote to memory of 4036 1788 setup_install.exe 79 PID 1788 wrote to memory of 2068 1788 setup_install.exe 80 PID 1788 wrote to memory of 2068 1788 setup_install.exe 80 PID 1788 wrote to memory of 2068 1788 setup_install.exe 80 PID 1788 wrote to memory of 1036 1788 setup_install.exe 81 PID 1788 wrote to memory of 1036 1788 setup_install.exe 81 PID 1788 wrote to memory of 1036 1788 setup_install.exe 81 PID 1788 wrote to memory of 1408 1788 setup_install.exe 82 PID 1788 wrote to memory of 1408 1788 setup_install.exe 82 PID 1788 wrote to memory of 1408 1788 setup_install.exe 82 PID 1788 wrote to memory of 3180 1788 setup_install.exe 83 PID 1788 wrote to memory of 3180 1788 setup_install.exe 83 PID 1788 wrote to memory of 3180 1788 setup_install.exe 83 PID 1788 wrote to memory of 4060 1788 setup_install.exe 86 PID 1788 wrote to memory of 4060 1788 setup_install.exe 86 PID 1788 wrote to memory of 4060 1788 setup_install.exe 86 PID 1788 wrote to memory of 2444 1788 setup_install.exe 84 PID 1788 wrote to memory of 2444 1788 setup_install.exe 84 PID 1788 wrote to memory of 2444 1788 setup_install.exe 84 PID 1788 wrote to memory of 3588 1788 setup_install.exe 85 PID 1788 wrote to memory of 3588 1788 setup_install.exe 85 PID 1788 wrote to memory of 3588 1788 setup_install.exe 85 PID 4036 wrote to memory of 360 4036 cmd.exe 87 PID 4036 wrote to memory of 360 4036 cmd.exe 87 PID 4036 wrote to memory of 360 4036 cmd.exe 87 PID 1788 wrote to memory of 3944 1788 setup_install.exe 88 PID 1788 wrote to memory of 3944 1788 setup_install.exe 88 PID 1788 wrote to memory of 3944 1788 setup_install.exe 88 PID 1788 wrote to memory of 4008 1788 setup_install.exe 95 PID 1788 wrote to memory of 4008 1788 setup_install.exe 95 PID 1788 wrote to memory of 4008 1788 setup_install.exe 95 PID 1036 wrote to memory of 3408 1036 cmd.exe 94 PID 1036 wrote to memory of 3408 1036 cmd.exe 94 PID 1036 wrote to memory of 3408 1036 cmd.exe 94 PID 1408 wrote to memory of 3660 1408 cmd.exe 93 PID 1408 wrote to memory of 3660 1408 cmd.exe 93 PID 1408 wrote to memory of 3660 1408 cmd.exe 93 PID 3180 wrote to memory of 2072 3180 cmd.exe 89 PID 3180 wrote to memory of 2072 3180 cmd.exe 89 PID 3180 wrote to memory of 2072 3180 cmd.exe 89 PID 2068 wrote to memory of 2144 2068 cmd.exe 90 PID 2068 wrote to memory of 2144 2068 cmd.exe 90 PID 2068 wrote to memory of 2144 2068 cmd.exe 90 PID 4060 wrote to memory of 4104 4060 cmd.exe 92 PID 4060 wrote to memory of 4104 4060 cmd.exe 92 PID 2072 wrote to memory of 4172 2072 metina_5.exe 91 PID 2072 wrote to memory of 4172 2072 metina_5.exe 91 PID 2072 wrote to memory of 4172 2072 metina_5.exe 91 PID 2444 wrote to memory of 4224 2444 cmd.exe 98 PID 2444 wrote to memory of 4224 2444 cmd.exe 98 PID 3588 wrote to memory of 4240 3588 cmd.exe 96 PID 3588 wrote to memory of 4240 3588 cmd.exe 96 PID 3588 wrote to memory of 4240 3588 cmd.exe 96 PID 3660 wrote to memory of 4332 3660 metina_4.exe 97 PID 3660 wrote to memory of 4332 3660 metina_4.exe 97 PID 3660 wrote to memory of 4332 3660 metina_4.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\15CC8191E7728032CDABE71FAC938139.exe"C:\Users\Admin\AppData\Local\Temp\15CC8191E7728032CDABE71FAC938139.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC9897034\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_1.exemetina_1.exe4⤵
- Executes dropped EXE
PID:360 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setpwd5⤵PID:4516
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_2.exemetina_2.exe4⤵
- Executes dropped EXE
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_3.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_3.exemetina_3.exe4⤵
- Executes dropped EXE
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_4.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_4.exemetina_4.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_5.exemetina_5.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\is-7F6VT.tmp\metina_5.tmp"C:\Users\Admin\AppData\Local\Temp\is-7F6VT.tmp\metina_5.tmp" /SL5="$50084,140518,56832,C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_5.exe"5⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\is-2QGUU.tmp\_____Zi____DanE______10.exe"C:\Users\Admin\AppData\Local\Temp\is-2QGUU.tmp\_____Zi____DanE______10.exe" /S /UID=burnerch36⤵PID:4688
-
C:\Program Files\Windows Mail\MEKXSDUABT\ultramediaburner.exe"C:\Program Files\Windows Mail\MEKXSDUABT\ultramediaburner.exe" /VERYSILENT7⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\is-QOT18.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-QOT18.tmp\ultramediaburner.tmp" /SL5="$4004A,281924,62464,C:\Program Files\Windows Mail\MEKXSDUABT\ultramediaburner.exe" /VERYSILENT8⤵PID:5724
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu9⤵PID:6100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cf-d27d8-54b-16b84-451a438cf65ec\Jixaevaexiry.exe"C:\Users\Admin\AppData\Local\Temp\cf-d27d8-54b-16b84-451a438cf65ec\Jixaevaexiry.exe"7⤵PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\a4-034da-d5b-f50bc-6e5fc384e746d\ZHiwaewutipo.exe"C:\Users\Admin\AppData\Local\Temp\a4-034da-d5b-f50bc-6e5fc384e746d\ZHiwaewutipo.exe"7⤵PID:5916
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tcjgx0au.bls\001.exe & exit8⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\tcjgx0au.bls\001.exeC:\Users\Admin\AppData\Local\Temp\tcjgx0au.bls\001.exe9⤵PID:4368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sgbzu2je.zzm\installer.exe /qn CAMPAIGN="654" & exit8⤵PID:6380
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_7.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_7.exemetina_7.exe4⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Roaming\Oe1jUxs3LaF7gIQV726Kpi6X.exe"C:\Users\Admin\AppData\Roaming\Oe1jUxs3LaF7gIQV726Kpi6X.exe"5⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 6566⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 6686⤵
- Program crash
PID:6112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 7686⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 8126⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 10726⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Roaming\m5CIKHiHkutkTHVKin2u5Usw.exe"C:\Users\Admin\AppData\Roaming\m5CIKHiHkutkTHVKin2u5Usw.exe"5⤵PID:1072
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe6⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Roaming\COfyRK3ziiW5e8ZvIupFQUFe.exe"C:\Users\Admin\AppData\Roaming\COfyRK3ziiW5e8ZvIupFQUFe.exe"5⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:4652
-
-
-
C:\Users\Admin\AppData\Roaming\niU3E9vHOEwqzXpcpJoRTe39.exe"C:\Users\Admin\AppData\Roaming\niU3E9vHOEwqzXpcpJoRTe39.exe"5⤵PID:4540
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\niU3E9vHOEwqzXpcpJoRTe39.exe"6⤵PID:5740
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30007⤵
- Runs ping.exe
PID:5028
-
-
-
-
C:\Users\Admin\AppData\Roaming\69chhdBqhdZpGGyQB9SaKE2Q.exe"C:\Users\Admin\AppData\Roaming\69chhdBqhdZpGGyQB9SaKE2Q.exe"5⤵PID:3984
-
-
C:\Users\Admin\AppData\Roaming\SxCy5UL7mi9M0pZY84znMKi8.exe"C:\Users\Admin\AppData\Roaming\SxCy5UL7mi9M0pZY84znMKi8.exe"5⤵PID:3880
-
-
C:\Users\Admin\AppData\Roaming\eEecfdrrIALsz9vixOqZMt6v.exe"C:\Users\Admin\AppData\Roaming\eEecfdrrIALsz9vixOqZMt6v.exe"5⤵PID:4516
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"6⤵PID:5804
-
-
C:\Program Files (x86)\Company\NewProduct\runme.exe"C:\Program Files (x86)\Company\NewProduct\runme.exe"6⤵PID:5772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 6567⤵
- Program crash
PID:6224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 6727⤵
- Program crash
PID:6416
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"6⤵PID:5960
-
-
C:\Program Files (x86)\Company\NewProduct\lij.exe"C:\Program Files (x86)\Company\NewProduct\lij.exe"6⤵PID:5888
-
-
-
C:\Users\Admin\AppData\Roaming\Wz1f0hTZ8xpWyJsdQTzKOs9i.exe"C:\Users\Admin\AppData\Roaming\Wz1f0hTZ8xpWyJsdQTzKOs9i.exe"5⤵PID:4392
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\49579.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\49579.exe"6⤵PID:5780
-
C:\Windows\SysWOW64\dfrgui.exe"C:\Windows\system32\dfrgui.exe"7⤵PID:5944
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Update" /tr "%SYSTEMDRIVE%\Users\%USERNAME%\AppData\Local\zz%USERNAME%\%USERNAME%.vbs" /F8⤵
- Creates scheduled task(s)
PID:5152
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat6⤵PID:5856
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 37⤵
- Runs ping.exe
PID:4484
-
-
-
-
C:\Users\Admin\AppData\Roaming\FNaHqxLJoVZAeSmvWEiyM7mp.exe"C:\Users\Admin\AppData\Roaming\FNaHqxLJoVZAeSmvWEiyM7mp.exe"5⤵PID:4064
-
C:\Users\Admin\AppData\Roaming\FNaHqxLJoVZAeSmvWEiyM7mp.exe"C:\Users\Admin\AppData\Roaming\FNaHqxLJoVZAeSmvWEiyM7mp.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4172
-
-
-
C:\Users\Admin\AppData\Roaming\DN9K3IFmBAb1bokALPrR1bBr.exe"C:\Users\Admin\AppData\Roaming\DN9K3IFmBAb1bokALPrR1bBr.exe"5⤵PID:5288
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setpwd6⤵PID:6340
-
-
-
C:\Users\Admin\AppData\Roaming\KoqlF5ZGpF7Mcry22o86pTu9.exe"C:\Users\Admin\AppData\Roaming\KoqlF5ZGpF7Mcry22o86pTu9.exe"5⤵PID:2420
-
-
C:\Users\Admin\AppData\Roaming\XFeExexvItXRCkBUyBDekvDe.exe"C:\Users\Admin\AppData\Roaming\XFeExexvItXRCkBUyBDekvDe.exe"5⤵PID:5012
-
C:\Users\Admin\AppData\Roaming\6161384.exe"C:\Users\Admin\AppData\Roaming\6161384.exe"6⤵PID:4948
-
-
C:\Users\Admin\AppData\Roaming\5839826.exe"C:\Users\Admin\AppData\Roaming\5839826.exe"6⤵PID:5608
-
-
C:\Users\Admin\AppData\Roaming\3196111.exe"C:\Users\Admin\AppData\Roaming\3196111.exe"6⤵PID:5788
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_8.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_8.exemetina_8.exe4⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"5⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PbOSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PbOSetp.exe"5⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\2870539.exe"C:\Users\Admin\AppData\Roaming\2870539.exe"6⤵PID:5468
-
-
C:\Users\Admin\AppData\Roaming\1668308.exe"C:\Users\Admin\AppData\Roaming\1668308.exe"6⤵PID:5520
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_6.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\7zSC9897034\metina_6.exemetina_6.exe4⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Roaming\5871179.exe"C:\Users\Admin\AppData\Roaming\5871179.exe"5⤵PID:4972
-
-
C:\Users\Admin\AppData\Roaming\4004354.exe"C:\Users\Admin\AppData\Roaming\4004354.exe"5⤵PID:5048
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵PID:5400
-
-
-
C:\Users\Admin\AppData\Roaming\2250892.exe"C:\Users\Admin\AppData\Roaming\2250892.exe"5⤵PID:4092
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_9.exe3⤵PID:3944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_10.exe3⤵PID:4008
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4636