Resubmissions
12-11-2024 01:29
241112-bwgrxs1gnf 1008-07-2021 12:18
210708-8z6d5h8z2n 1006-07-2021 17:53
210706-g6we6sa7sa 1019-06-2021 18:17
210619-vr8bj2dzfn 1017-06-2021 21:39
210617-a9cvlnmrbx 1011-06-2021 17:26
210611-wvab1yw2tj 1008-06-2021 06:47
210608-qrbpch3y46 1008-06-2021 06:47
210608-64tndgm1ln 1005-06-2021 18:40
210605-cd6qpr55sx 1004-06-2021 11:56
210604-5c416rs3ns 10Analysis
-
max time kernel
71s -
max time network
171s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-06-2021 11:56
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Install2.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Install2.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
keygen-step-4.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
keygen-step-4.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
keygen-step-4d.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
keygen-step-4d.exe
Resource
win10v20210408
Errors
General
-
Target
keygen-step-4d.exe
-
Size
4.6MB
-
MD5
563107b1df2a00f4ec868acd9e08a205
-
SHA1
9cb9c91d66292f5317aa50d92e38834861e9c9b7
-
SHA256
bf2bd257dde4921ce83c7c1303fafe7f9f81e53c2775d3c373ced482b22eb8a9
-
SHA512
99a8d247fa435c4cd95be7bc64c7dd6e382371f3a3c160aac3995fd705e4fd3f6622c23784a4ae3457c87536347d15eda3f08aa616450778a99376df540d74d1
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 7924 created 5556 7924 WerFault.exe 136 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Blocklisted process makes network request 28 IoCs
flow pid Process 201 5324 MsiExec.exe 209 5324 MsiExec.exe 216 5324 MsiExec.exe 224 5324 MsiExec.exe 227 5324 MsiExec.exe 228 5324 MsiExec.exe 229 5324 MsiExec.exe 230 5324 MsiExec.exe 232 5324 MsiExec.exe 238 5324 MsiExec.exe 239 5324 MsiExec.exe 244 5324 MsiExec.exe 246 5324 MsiExec.exe 247 5324 MsiExec.exe 253 5324 MsiExec.exe 254 5324 MsiExec.exe 258 7792 cmd.exe 261 7792 cmd.exe 262 5324 MsiExec.exe 264 7792 cmd.exe 265 5324 MsiExec.exe 268 7792 cmd.exe 269 5324 MsiExec.exe 270 7792 cmd.exe 272 5324 MsiExec.exe 276 5324 MsiExec.exe 300 7792 cmd.exe 306 7792 cmd.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Ultra.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ___________23.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ___________RUb__________y.exe -
Executes dropped EXE 64 IoCs
pid Process 3912 xiuhuali.exe 3424 JoSetp.exe 2100 Install.exe 2740 Install.tmp 852 Ultra.exe 4268 ultramediaburner.exe 4300 ultramediaburner.tmp 4380 UltraMediaBurner.exe 4396 Kugytinipo.exe 4456 Jaejaerejaesu.exe 4560 filee.exe 1676 001.exe 5560 installer.exe 5912 gaoou.exe 5988 jg6_6asg.exe 6084 svchost.exe 5340 Setup3310.exe 5468 Setup3310.tmp 4580 5718578.exe 2324 jfiag3g_gg.exe 1196 Setup.exe 5408 hjjgaa.exe 5556 RunWW.exe 5496 guihuali-game.exe 5576 lylal220.exe 4120 003.exe 6052 BarSetpFile.exe 2256 i-record.exe 6180 ask.exe 6204 lylal220.tmp 6220 Browser.exe 6324 LabPicV3.tmp 6580 yRVGeBTYzVxq.exe 6608 Browzar.exe 6788 jfiag3g_gg.exe 6820 ___________23.exe 6832 ___________RUb__________y.exe 7080 1617796.exe 4580 5718578.exe 6172 3991532.exe 6484 WinHoster.exe 6216 prolab.exe 6316 prolab.tmp 6480 Qezhemebybo.exe 6176 jfiag3g_gg.exe 6404 Paeshilaegimae.exe 7052 irecord.exe 6596 irecord.tmp 6300 Quxanyluvu.exe 2764 Tajybaepaesha.exe 2256 i-record.exe 5072 001.exe 7032 installer.exe 6540 yRVGeBTYzVxq.exe 6984 gaoou.exe 5256 jfiag3g_gg.exe 7196 001.exe 7632 installer.exe 7756 Setup3310.exe 7792 cmd.exe 7956 gaoou.exe 8032 gaoou.exe 8092 jfiag3g_gg.exe 8140 jfiag3g_gg.exe -
resource yara_rule behavioral8/files/0x000100000001abc1-273.dat upx behavioral8/files/0x000100000001abc1-274.dat upx behavioral8/files/0x000100000001ac1c-339.dat upx -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation keygen-step-4d.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation 5718578.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation guihuali-game.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Qezhemebybo.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Quxanyluvu.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation google-game.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Kugytinipo.exe -
Loads dropped DLL 50 IoCs
pid Process 940 rundll32.exe 2740 Install.tmp 5560 installer.exe 5560 installer.exe 5560 installer.exe 5212 MsiExec.exe 5212 MsiExec.exe 5468 Setup3310.tmp 5468 Setup3310.tmp 5352 rUNdlL32.eXe 5324 MsiExec.exe 5324 MsiExec.exe 5324 MsiExec.exe 5324 MsiExec.exe 5324 MsiExec.exe 5324 MsiExec.exe 6204 lylal220.tmp 5324 MsiExec.exe 6324 LabPicV3.tmp 5324 MsiExec.exe 5324 MsiExec.exe 5324 MsiExec.exe 5560 installer.exe 5324 MsiExec.exe 5324 MsiExec.exe 7032 installer.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 5324 MsiExec.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 2256 i-record.exe 7792 cmd.exe 7792 cmd.exe 7176 rUNdlL32.eXe 7480 Setup3310.tmp 7480 Setup3310.tmp 8136 rUNdlL32.eXe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5568 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Google\\Haemeshaelemae.exe\"" ___________RUb__________y.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Media Player\\Qalutimaefu.exe\"" Ultra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gaoou.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5718578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows NT\\SHohahaeheja.exe\"" ___________23.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Browzar.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg6_6asg.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 235 ip-api.com 435 api.2ip.ua 436 api.2ip.ua 521 api.2ip.ua 111 ipinfo.io 114 ipinfo.io 257 ipinfo.io 261 ipinfo.io 297 ipinfo.io 67 ip-api.com -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 688 set thread context of 3172 688 svchost.exe 79 PID 688 set thread context of 4156 688 svchost.exe 85 PID 6580 set thread context of 6540 6580 yRVGeBTYzVxq.exe 184 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Imaging.dll prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\WeifenLuo.WinFormsUI.dll prolab.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File created C:\Program Files (x86)\recording\is-8B9CK.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-6HU8J.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.exe Setup.exe File created C:\Program Files (x86)\Picture Lab\is-M6SEP.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-0AOFL.tmp prolab.tmp File created C:\Program Files (x86)\Windows NT\SHohahaeheja.exe.config ___________23.exe File opened for modification C:\Program Files (x86)\recording\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\Windows Media Player\Qalutimaefu.exe Ultra.exe File created C:\Program Files (x86)\Picture Lab\is-HIRI3.tmp prolab.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File created C:\Program Files\VideoLAN\QKOBNJBPPQ\ultramediaburner.exe Ultra.exe File created C:\Program Files (x86)\UltraMediaBurner\is-11VBL.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Picture Lab\SourceLibrary.dll prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-CMI2O.tmp ultramediaburner.tmp File created C:\Program Files (x86)\Browzar\Uninstall.ini Browser.exe File opened for modification C:\Program Files (x86)\Picture Lab\SourceGrid2.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-PQUVG.tmp prolab.tmp File opened for modification C:\Program Files (x86)\recording\avdevice-53.dll irecord.tmp File created C:\Program Files (x86)\Google\Haemeshaelemae.exe.config ___________RUb__________y.exe File created C:\Program Files (x86)\recording\is-BNS9K.tmp irecord.tmp File created C:\Program Files (x86)\Windows Media Player\Qalutimaefu.exe.config Ultra.exe File created C:\Program Files (x86)\Data Finder\Versium Research\Uninstall.ini Setup.exe File created C:\Program Files\Windows Multimedia Platform\RVXLPRWHOC\prolab.exe.config ___________23.exe File created C:\Program Files\Windows Media Player\XBTGPSLMBF\irecord.exe.config ___________RUb__________y.exe File opened for modification C:\Program Files (x86)\recording\AForge.Video.FFMPEG.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\recording\is-SN0U8.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-OMQIS.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-2LR99.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File created C:\Program Files\libEGL.dll xiuhuali.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe Setup.exe File created C:\Program Files\Windows Multimedia Platform\RVXLPRWHOC\prolab.exe ___________23.exe File created C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File created C:\Program Files (x86)\recording\is-6021U.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-3ASDK.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\003.exe Setup.exe File opened for modification C:\Program Files (x86)\Browzar\yRVGeBTYzVxq.exe Browser.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\recording\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\recording\is-HM8OT.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe Setup.exe File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Math.dll prolab.tmp File opened for modification C:\Program Files (x86)\Picture Lab\Pictures Lab.exe prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-J2AQC.tmp prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-1LUP4.tmp prolab.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\recording\avformat-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\i-record.exe irecord.tmp File opened for modification C:\Program Files (x86)\recording\swresample-0.dll irecord.tmp File created C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-KM4MK.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-O6C0D.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe Setup.exe File opened for modification C:\Program Files (x86)\Browzar\Uninstall.exe Browser.exe File opened for modification C:\Program Files (x86)\recording\avcodec-53.dll irecord.tmp File created C:\Program Files\VideoLAN\QKOBNJBPPQ\ultramediaburner.exe.config Ultra.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSIDE71.tmp msiexec.exe File opened for modification C:\Windows\Installer\f749c17.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIAAE1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBF38.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIB756.tmp msiexec.exe File created C:\Windows\Installer\f749c17.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDCF7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC5B3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDE03.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE319.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA466.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAD53.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBBEB.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSIA3F7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA64C.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f749c1a.msi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA503.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIDEE0.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA137.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC0FE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC41C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDF7D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSID8C0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDDA4.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 6572 6608 WerFault.exe 149 7924 5556 WerFault.exe 136 2412 7080 WerFault.exe 153 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 7556 timeout.exe -
Kills process with taskkill 3 IoCs
pid Process 6068 taskkill.exe 5688 taskkill.exe 7156 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance google-game.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\PackageName = "Windows Manager - Postback Y.msi" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69RG4ZP0-857P-S13A-ZW93-6DTG316B7ZWC} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 1d24df8b702cd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ}\1 = "4156" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 1d24df8b702cd701 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Ultra.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ultra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 filee.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 filee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4360 PING.EXE -
Script User-Agent 18 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 180 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 295 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 306 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 310 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 264 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 302 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 120 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 138 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 258 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 260 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 325 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 112 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 114 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 261 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 297 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 300 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 323 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 rundll32.exe 940 rundll32.exe 688 svchost.exe 688 svchost.exe 688 svchost.exe 688 svchost.exe 4300 ultramediaburner.tmp 4300 ultramediaburner.tmp 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe 4456 Jaejaerejaesu.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2664 MicrosoftEdgeCP.exe 2664 MicrosoftEdgeCP.exe 2664 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeTcbPrivilege 688 svchost.exe Token: SeDebugPrivilege 3424 JoSetp.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 940 rundll32.exe Token: SeDebugPrivilege 852 Ultra.exe Token: SeTcbPrivilege 688 svchost.exe Token: SeAuditPrivilege 2416 svchost.exe Token: SeDebugPrivilege 4396 Kugytinipo.exe Token: SeDebugPrivilege 4456 Jaejaerejaesu.exe Token: SeAssignPrimaryTokenPrivilege 2752 svchost.exe Token: SeIncreaseQuotaPrivilege 2752 svchost.exe Token: SeSecurityPrivilege 2752 svchost.exe Token: SeTakeOwnershipPrivilege 2752 svchost.exe Token: SeLoadDriverPrivilege 2752 svchost.exe Token: SeSystemtimePrivilege 2752 svchost.exe Token: SeBackupPrivilege 2752 svchost.exe Token: SeRestorePrivilege 2752 svchost.exe Token: SeShutdownPrivilege 2752 svchost.exe Token: SeSystemEnvironmentPrivilege 2752 svchost.exe Token: SeUndockPrivilege 2752 svchost.exe Token: SeManageVolumePrivilege 2752 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2752 svchost.exe Token: SeIncreaseQuotaPrivilege 2752 svchost.exe Token: SeSecurityPrivilege 2752 svchost.exe Token: SeTakeOwnershipPrivilege 2752 svchost.exe Token: SeLoadDriverPrivilege 2752 svchost.exe Token: SeSystemtimePrivilege 2752 svchost.exe Token: SeBackupPrivilege 2752 svchost.exe Token: SeRestorePrivilege 2752 svchost.exe Token: SeShutdownPrivilege 2752 svchost.exe Token: SeSystemEnvironmentPrivilege 2752 svchost.exe Token: SeUndockPrivilege 2752 svchost.exe Token: SeManageVolumePrivilege 2752 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2752 svchost.exe Token: SeIncreaseQuotaPrivilege 2752 svchost.exe Token: SeSecurityPrivilege 2752 svchost.exe Token: SeTakeOwnershipPrivilege 2752 svchost.exe Token: SeLoadDriverPrivilege 2752 svchost.exe Token: SeSystemtimePrivilege 2752 svchost.exe Token: SeBackupPrivilege 2752 svchost.exe Token: SeRestorePrivilege 2752 svchost.exe Token: SeShutdownPrivilege 2752 svchost.exe Token: SeSystemEnvironmentPrivilege 2752 svchost.exe Token: SeUndockPrivilege 2752 svchost.exe Token: SeManageVolumePrivilege 2752 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2752 svchost.exe Token: SeIncreaseQuotaPrivilege 2752 svchost.exe Token: SeSecurityPrivilege 2752 svchost.exe Token: SeTakeOwnershipPrivilege 2752 svchost.exe Token: SeLoadDriverPrivilege 2752 svchost.exe Token: SeSystemtimePrivilege 2752 svchost.exe Token: SeBackupPrivilege 2752 svchost.exe Token: SeRestorePrivilege 2752 svchost.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4300 ultramediaburner.tmp 5560 installer.exe 5468 Setup3310.tmp 6316 prolab.tmp 6596 irecord.tmp 7792 cmd.exe 7480 Setup3310.tmp -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3912 xiuhuali.exe 3912 xiuhuali.exe 4952 MicrosoftEdge.exe 2664 MicrosoftEdgeCP.exe 2664 MicrosoftEdgeCP.exe 6608 Browzar.exe 6608 Browzar.exe 6608 Browzar.exe 6608 Browzar.exe 6608 Browzar.exe 6608 Browzar.exe 6608 Browzar.exe 7460 MicrosoftEdge.exe 7284 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3912 4024 keygen-step-4d.exe 75 PID 4024 wrote to memory of 3912 4024 keygen-step-4d.exe 75 PID 4024 wrote to memory of 3912 4024 keygen-step-4d.exe 75 PID 3912 wrote to memory of 940 3912 xiuhuali.exe 77 PID 3912 wrote to memory of 940 3912 xiuhuali.exe 77 PID 3912 wrote to memory of 940 3912 xiuhuali.exe 77 PID 4024 wrote to memory of 3424 4024 keygen-step-4d.exe 78 PID 4024 wrote to memory of 3424 4024 keygen-step-4d.exe 78 PID 940 wrote to memory of 688 940 rundll32.exe 68 PID 940 wrote to memory of 2596 940 rundll32.exe 33 PID 688 wrote to memory of 3172 688 svchost.exe 79 PID 688 wrote to memory of 3172 688 svchost.exe 79 PID 688 wrote to memory of 3172 688 svchost.exe 79 PID 940 wrote to memory of 68 940 rundll32.exe 61 PID 940 wrote to memory of 2484 940 rundll32.exe 25 PID 940 wrote to memory of 2416 940 rundll32.exe 27 PID 940 wrote to memory of 1120 940 rundll32.exe 56 PID 940 wrote to memory of 1032 940 rundll32.exe 10 PID 940 wrote to memory of 1448 940 rundll32.exe 50 PID 940 wrote to memory of 1896 940 rundll32.exe 20 PID 940 wrote to memory of 1268 940 rundll32.exe 53 PID 940 wrote to memory of 1316 940 rundll32.exe 11 PID 940 wrote to memory of 2752 940 rundll32.exe 35 PID 940 wrote to memory of 2760 940 rundll32.exe 48 PID 4024 wrote to memory of 2100 4024 keygen-step-4d.exe 80 PID 4024 wrote to memory of 2100 4024 keygen-step-4d.exe 80 PID 4024 wrote to memory of 2100 4024 keygen-step-4d.exe 80 PID 2100 wrote to memory of 2740 2100 Install.exe 81 PID 2100 wrote to memory of 2740 2100 Install.exe 81 PID 2100 wrote to memory of 2740 2100 Install.exe 81 PID 2740 wrote to memory of 852 2740 Install.tmp 82 PID 2740 wrote to memory of 852 2740 Install.tmp 82 PID 688 wrote to memory of 4156 688 svchost.exe 85 PID 688 wrote to memory of 4156 688 svchost.exe 85 PID 688 wrote to memory of 4156 688 svchost.exe 85 PID 852 wrote to memory of 4268 852 Ultra.exe 87 PID 852 wrote to memory of 4268 852 Ultra.exe 87 PID 852 wrote to memory of 4268 852 Ultra.exe 87 PID 4268 wrote to memory of 4300 4268 ultramediaburner.exe 88 PID 4268 wrote to memory of 4300 4268 ultramediaburner.exe 88 PID 4268 wrote to memory of 4300 4268 ultramediaburner.exe 88 PID 4300 wrote to memory of 4380 4300 ultramediaburner.tmp 89 PID 4300 wrote to memory of 4380 4300 ultramediaburner.tmp 89 PID 852 wrote to memory of 4396 852 Ultra.exe 90 PID 852 wrote to memory of 4396 852 Ultra.exe 90 PID 852 wrote to memory of 4456 852 Ultra.exe 91 PID 852 wrote to memory of 4456 852 Ultra.exe 91 PID 4024 wrote to memory of 4560 4024 keygen-step-4d.exe 92 PID 4024 wrote to memory of 4560 4024 keygen-step-4d.exe 92 PID 4024 wrote to memory of 4560 4024 keygen-step-4d.exe 92 PID 4456 wrote to memory of 3144 4456 Jaejaerejaesu.exe 96 PID 4456 wrote to memory of 3144 4456 Jaejaerejaesu.exe 96 PID 3144 wrote to memory of 1676 3144 cmd.exe 98 PID 3144 wrote to memory of 1676 3144 cmd.exe 98 PID 3144 wrote to memory of 1676 3144 cmd.exe 98 PID 4560 wrote to memory of 4940 4560 filee.exe 99 PID 4560 wrote to memory of 4940 4560 filee.exe 99 PID 4560 wrote to memory of 4940 4560 filee.exe 99 PID 4940 wrote to memory of 4360 4940 cmd.exe 102 PID 4940 wrote to memory of 4360 4940 cmd.exe 102 PID 4940 wrote to memory of 4360 4940 cmd.exe 102 PID 4456 wrote to memory of 636 4456 Jaejaerejaesu.exe 104 PID 4456 wrote to memory of 636 4456 Jaejaerejaesu.exe 104 PID 4456 wrote to memory of 5396 4456 Jaejaerejaesu.exe 106
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:1032
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1316
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1896
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2484
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2596
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2760
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1448
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1268
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1120
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:68
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiuhuali.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\JoSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\is-N4ELK.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-N4ELK.tmp\Install.tmp" /SL5="$40160,235791,152064,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\is-23J0D.tmp\Ultra.exe"C:\Users\Admin\AppData\Local\Temp\is-23J0D.tmp\Ultra.exe" /S /UID=burnerch14⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\VideoLAN\QKOBNJBPPQ\ultramediaburner.exe"C:\Program Files\VideoLAN\QKOBNJBPPQ\ultramediaburner.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\is-ANSJG.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-ANSJG.tmp\ultramediaburner.tmp" /SL5="$201EE,281924,62464,C:\Program Files\VideoLAN\QKOBNJBPPQ\ultramediaburner.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu7⤵
- Executes dropped EXE
PID:4380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dc-a682a-45f-cc7ad-d7a5845ec83cc\Kugytinipo.exe"C:\Users\Admin\AppData\Local\Temp\dc-a682a-45f-cc7ad-d7a5845ec83cc\Kugytinipo.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\29-a224d-61e-6c487-b7405925c6309\Jaejaerejaesu.exe"C:\Users\Admin\AppData\Local\Temp\29-a224d-61e-6c487-b7405925c6309\Jaejaerejaesu.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\umroavga.mcf\001.exe & exit6⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\umroavga.mcf\001.exeC:\Users\Admin\AppData\Local\Temp\umroavga.mcf\001.exe7⤵
- Executes dropped EXE
PID:1676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\asrdnac5.tap\GcleanerEU.exe /eufive & exit6⤵PID:636
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yaghitxo.luz\installer.exe /qn CAMPAIGN="654" & exit6⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\yaghitxo.luz\installer.exeC:\Users\Admin\AppData\Local\Temp\yaghitxo.luz\installer.exe /qn CAMPAIGN="654"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5560 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\yaghitxo.luz\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\yaghitxo.luz\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1622555546 /qn CAMPAIGN=""654"" " CAMPAIGN="654"8⤵PID:5328
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qqbqj5lb.a0z\gaoou.exe & exit6⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\qqbqj5lb.a0z\gaoou.exeC:\Users\Admin\AppData\Local\Temp\qqbqj5lb.a0z\gaoou.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5912 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:2324
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fkeokf25.zcc\Setup3310.exe /Verysilent /subid=623 & exit6⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\fkeokf25.zcc\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\fkeokf25.zcc\Setup3310.exe /Verysilent /subid=6237⤵
- Executes dropped EXE
PID:5340 -
C:\Users\Admin\AppData\Local\Temp\is-B90DV.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-B90DV.tmp\Setup3310.tmp" /SL5="$403EA,138429,56832,C:\Users\Admin\AppData\Local\Temp\fkeokf25.zcc\Setup3310.exe" /Verysilent /subid=6238⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\is-KOT8D.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KOT8D.tmp\Setup.exe" /Verysilent9⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1196 -
C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"10⤵
- Executes dropped EXE
PID:5408 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
- Executes dropped EXE
PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
- Executes dropped EXE
PID:6176
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"10⤵
- Executes dropped EXE
PID:5556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5556 -s 92411⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:7924
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
PID:5496 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",install11⤵PID:7032
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"10⤵
- Executes dropped EXE
PID:5576 -
C:\Users\Admin\AppData\Local\Temp\is-AJTV4.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-AJTV4.tmp\lylal220.tmp" /SL5="$104F6,140518,56832,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6204 -
C:\Users\Admin\AppData\Local\Temp\is-08SKP.tmp\___________RUb__________y.exe"C:\Users\Admin\AppData\Local\Temp\is-08SKP.tmp\___________RUb__________y.exe" /S /UID=lylal22012⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:6832 -
C:\Program Files\Windows Media Player\XBTGPSLMBF\irecord.exe"C:\Program Files\Windows Media Player\XBTGPSLMBF\irecord.exe" /VERYSILENT13⤵
- Executes dropped EXE
PID:7052 -
C:\Users\Admin\AppData\Local\Temp\is-UQFF2.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-UQFF2.tmp\irecord.tmp" /SL5="$504F8,6139911,56832,C:\Program Files\Windows Media Player\XBTGPSLMBF\irecord.exe" /VERYSILENT14⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:6596 -
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5b-158aa-390-b00ba-3b10ef7ecad16\Quxanyluvu.exe"C:\Users\Admin\AppData\Local\Temp\5b-158aa-390-b00ba-3b10ef7ecad16\Quxanyluvu.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
PID:6300
-
-
C:\Users\Admin\AppData\Local\Temp\85-b9e68-4f5-76da2-1fc1225448bc6\Tajybaepaesha.exe"C:\Users\Admin\AppData\Local\Temp\85-b9e68-4f5-76da2-1fc1225448bc6\Tajybaepaesha.exe"13⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y2s5j3iz.wok\001.exe & exit14⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\y2s5j3iz.wok\001.exeC:\Users\Admin\AppData\Local\Temp\y2s5j3iz.wok\001.exe15⤵
- Executes dropped EXE
PID:7196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\53zfhyyv.ih0\GcleanerEU.exe /eufive & exit14⤵PID:7288
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\weyjikyx.snd\installer.exe /qn CAMPAIGN="654" & exit14⤵PID:7456
-
C:\Users\Admin\AppData\Local\Temp\weyjikyx.snd\installer.exeC:\Users\Admin\AppData\Local\Temp\weyjikyx.snd\installer.exe /qn CAMPAIGN="654"15⤵
- Executes dropped EXE
PID:7632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rvksomk2.15n\gaoou.exe & exit14⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\rvksomk2.15n\gaoou.exeC:\Users\Admin\AppData\Local\Temp\rvksomk2.15n\gaoou.exe15⤵
- Executes dropped EXE
PID:8032 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵
- Executes dropped EXE
PID:8140
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:8180
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\13lhl2gw.2bo\Setup3310.exe /Verysilent /subid=623 & exit14⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\13lhl2gw.2bo\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\13lhl2gw.2bo\Setup3310.exe /Verysilent /subid=62315⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\is-PGVO4.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-PGVO4.tmp\Setup3310.tmp" /SL5="$401FA,138429,56832,C:\Users\Admin\AppData\Local\Temp\13lhl2gw.2bo\Setup3310.exe" /Verysilent /subid=62316⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7480 -
C:\Users\Admin\AppData\Local\Temp\is-4KCAU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4KCAU.tmp\Setup.exe" /Verysilent17⤵PID:6576
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1335jgid.ayh\google-game.exe & exit14⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\1335jgid.ayh\google-game.exeC:\Users\Admin\AppData\Local\Temp\1335jgid.ayh\google-game.exe15⤵
- Checks computer location settings
- Modifies registry class
PID:7448 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",get16⤵
- Loads dropped DLL
PID:8136
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qll25mw3.twk\GcleanerWW.exe /mixone & exit14⤵PID:4224
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ym5nt23q.rct\005.exe & exit14⤵PID:7656
-
C:\Users\Admin\AppData\Local\Temp\ym5nt23q.rct\005.exeC:\Users\Admin\AppData\Local\Temp\ym5nt23q.rct\005.exe15⤵PID:7764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mpwbw0wd.qmx\toolspab1.exe & exit14⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\mpwbw0wd.qmx\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\mpwbw0wd.qmx\toolspab1.exe15⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\mpwbw0wd.qmx\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\mpwbw0wd.qmx\toolspab1.exe16⤵PID:3532
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5u2eeza3.xgr\702564a0.exe & exit14⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\5u2eeza3.xgr\702564a0.exeC:\Users\Admin\AppData\Local\Temp\5u2eeza3.xgr\702564a0.exe15⤵PID:5596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d0nfulch.rct\installer.exe /qn CAMPAIGN="654" & exit14⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7792 -
C:\Users\Admin\AppData\Local\Temp\d0nfulch.rct\installer.exeC:\Users\Admin\AppData\Local\Temp\d0nfulch.rct\installer.exe /qn CAMPAIGN="654"15⤵PID:6780
-
-
-
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"10⤵
- Executes dropped EXE
PID:6052 -
C:\Users\Admin\AppData\Roaming\1617796.exe"C:\Users\Admin\AppData\Roaming\1617796.exe"11⤵
- Executes dropped EXE
PID:7080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7080 -s 184012⤵
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Roaming\5718578.exe"C:\Users\Admin\AppData\Roaming\5718578.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
PID:4580 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"12⤵
- Executes dropped EXE
PID:6484
-
-
-
C:\Users\Admin\AppData\Roaming\3991532.exe"C:\Users\Admin\AppData\Roaming\3991532.exe"11⤵
- Executes dropped EXE
PID:6172 -
C:\Users\Admin\AppData\Roaming\3991532.exe"{path}"12⤵PID:7512
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"10⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\is-HKF0V.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-HKF0V.tmp\LabPicV3.tmp" /SL5="$104FC,140559,56832,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6324 -
C:\Users\Admin\AppData\Local\Temp\is-N31AI.tmp\___________23.exe"C:\Users\Admin\AppData\Local\Temp\is-N31AI.tmp\___________23.exe" /S /UID=lab21412⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:6820 -
C:\Program Files\Windows Multimedia Platform\RVXLPRWHOC\prolab.exe"C:\Program Files\Windows Multimedia Platform\RVXLPRWHOC\prolab.exe" /VERYSILENT13⤵
- Executes dropped EXE
PID:6216 -
C:\Users\Admin\AppData\Local\Temp\is-5CDVO.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-5CDVO.tmp\prolab.tmp" /SL5="$204FA,575243,216576,C:\Program Files\Windows Multimedia Platform\RVXLPRWHOC\prolab.exe" /VERYSILENT14⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:6316
-
-
-
C:\Users\Admin\AppData\Local\Temp\ff-ededd-f75-84a84-08e7622ab3de9\Qezhemebybo.exe"C:\Users\Admin\AppData\Local\Temp\ff-ededd-f75-84a84-08e7622ab3de9\Qezhemebybo.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
PID:6480
-
-
C:\Users\Admin\AppData\Local\Temp\f4-caaad-d22-fad8f-de38f3ad17dea\Paeshilaegimae.exe"C:\Users\Admin\AppData\Local\Temp\f4-caaad-d22-fad8f-de38f3ad17dea\Paeshilaegimae.exe"13⤵
- Executes dropped EXE
PID:6404 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xd0q2g5f.aan\001.exe & exit14⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\xd0q2g5f.aan\001.exeC:\Users\Admin\AppData\Local\Temp\xd0q2g5f.aan\001.exe15⤵
- Executes dropped EXE
PID:5072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\whyn55fr.js2\GcleanerEU.exe /eufive & exit14⤵PID:6892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vtabi03j.tni\installer.exe /qn CAMPAIGN="654" & exit14⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\vtabi03j.tni\installer.exeC:\Users\Admin\AppData\Local\Temp\vtabi03j.tni\installer.exe /qn CAMPAIGN="654"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5wf1x5ac.t0l\gaoou.exe & exit14⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\5wf1x5ac.t0l\gaoou.exeC:\Users\Admin\AppData\Local\Temp\5wf1x5ac.t0l\gaoou.exe15⤵
- Executes dropped EXE
PID:6984 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵
- Executes dropped EXE
PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt16⤵PID:7220
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fdzstgkn.3jc\Setup3310.exe /Verysilent /subid=623 & exit14⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\fdzstgkn.3jc\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\fdzstgkn.3jc\Setup3310.exe /Verysilent /subid=62315⤵
- Executes dropped EXE
PID:7756 -
C:\Users\Admin\AppData\Local\Temp\is-798IR.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-798IR.tmp\Setup3310.tmp" /SL5="$106A6,138429,56832,C:\Users\Admin\AppData\Local\Temp\fdzstgkn.3jc\Setup3310.exe" /Verysilent /subid=62316⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\is-1IT9F.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1IT9F.tmp\Setup.exe" /Verysilent17⤵
- Drops file in Program Files directory
PID:2624
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5wqjr2uh.as0\google-game.exe & exit14⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\5wqjr2uh.as0\google-game.exeC:\Users\Admin\AppData\Local\Temp\5wqjr2uh.as0\google-game.exe15⤵
- Checks computer location settings
PID:6760 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",get16⤵
- Loads dropped DLL
PID:7176
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2o3dvw5r.miu\GcleanerWW.exe /mixone & exit14⤵PID:7616
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sayrr42i.u3f\005.exe & exit14⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\sayrr42i.u3f\005.exeC:\Users\Admin\AppData\Local\Temp\sayrr42i.u3f\005.exe15⤵PID:5664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fpznpsqh.1t0\toolspab1.exe & exit14⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\fpznpsqh.1t0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\fpznpsqh.1t0\toolspab1.exe15⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\fpznpsqh.1t0\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\fpznpsqh.1t0\toolspab1.exe16⤵PID:2896
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\odf1b0mm.mmd\702564a0.exe & exit14⤵PID:8088
-
C:\Users\Admin\AppData\Local\Temp\odf1b0mm.mmd\702564a0.exeC:\Users\Admin\AppData\Local\Temp\odf1b0mm.mmd\702564a0.exe15⤵PID:6064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hss1wgkp.1ex\installer.exe /qn CAMPAIGN="654" & exit14⤵PID:6260
-
C:\Users\Admin\AppData\Local\Temp\hss1wgkp.1ex\installer.exeC:\Users\Admin\AppData\Local\Temp\hss1wgkp.1ex\installer.exe /qn CAMPAIGN="654"15⤵PID:5296
-
-
-
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\003.exe"C:\Program Files (x86)\Data Finder\Versium Research\003.exe"10⤵
- Executes dropped EXE
PID:4120
-
-
C:\Program Files (x86)\Data Finder\Versium Research\ask.exe"C:\Program Files (x86)\Data Finder\Versium Research\ask.exe"10⤵
- Executes dropped EXE
PID:6180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe11⤵PID:5188
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe12⤵
- Kills process with taskkill
PID:7156
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\Browser.exe"C:\Program Files (x86)\Data Finder\Versium Research\Browser.exe"10⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6220 -
C:\Program Files (x86)\Browzar\yRVGeBTYzVxq.exe"C:\Program Files (x86)\Browzar\yRVGeBTYzVxq.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6580 -
C:\Program Files (x86)\Browzar\yRVGeBTYzVxq.exe"C:\Program Files (x86)\Browzar\yRVGeBTYzVxq.exe"12⤵
- Executes dropped EXE
PID:6540
-
-
-
C:\Program Files (x86)\Browzar\Browzar.exe"C:\Program Files (x86)\Browzar\Browzar.exe"11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:6608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6608 -s 214412⤵
- Drops file in Windows directory
- Program crash
PID:6572
-
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ssu4zavh.vb4\google-game.exe & exit6⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\ssu4zavh.vb4\google-game.exeC:\Users\Admin\AppData\Local\Temp\ssu4zavh.vb4\google-game.exe7⤵PID:4580
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",get8⤵
- Loads dropped DLL
PID:5352
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hbbldkn4.2ut\GcleanerWW.exe /mixone & exit6⤵PID:5476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i2bo12zz.nnf\005.exe & exit6⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\i2bo12zz.nnf\005.exeC:\Users\Admin\AppData\Local\Temp\i2bo12zz.nnf\005.exe7⤵PID:856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hm0ie42e.fgy\toolspab1.exe & exit6⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\hm0ie42e.fgy\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hm0ie42e.fgy\toolspab1.exe7⤵PID:7640
-
C:\Users\Admin\AppData\Local\Temp\hm0ie42e.fgy\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hm0ie42e.fgy\toolspab1.exe8⤵PID:4552
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pbz3zkwr.3tu\702564a0.exe & exit6⤵PID:7780
-
C:\Users\Admin\AppData\Local\Temp\pbz3zkwr.3tu\702564a0.exeC:\Users\Admin\AppData\Local\Temp\pbz3zkwr.3tu\702564a0.exe7⤵PID:5368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vny42dyt.v5c\installer.exe /qn CAMPAIGN="654" & exit6⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\vny42dyt.v5c\installer.exeC:\Users\Admin\AppData\Local\Temp\vny42dyt.v5c\installer.exe /qn CAMPAIGN="654"7⤵PID:7812
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\filee.exe" >> NUL3⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:4360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg6_6asg.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\gaoou.exe"2⤵
- Executes dropped EXE
PID:7956 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:8092
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:8176
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3172
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4156
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4952
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5004
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2732
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6000
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3608 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7E5C4C7045A1F7F394EB19C196C25A19 C2⤵
- Loads dropped DLL
PID:5212
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2E22C44A0EB8A68999F0273C16440A6F2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5324 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:5688
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D78B5D35AEDAA063D20431FADA786516 E Global\MSI00002⤵
- Loads dropped DLL
PID:7144
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Executes dropped EXE
PID:6084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7460
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7284
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5164
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\4EE.exeC:\Users\Admin\AppData\Local\Temp\4EE.exe1⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\4EE.exeC:\Users\Admin\AppData\Local\Temp\4EE.exe2⤵PID:2712
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\17be6b90-7ccb-4516-aae7-769f5ea5acd0" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\4EE.exe"C:\Users\Admin\AppData\Local\Temp\4EE.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\4EE.exe"C:\Users\Admin\AppData\Local\Temp\4EE.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:5432
-
C:\Users\Admin\AppData\Local\ba3cc99d-fa16-4c31-9303-1b2017d34eac\updatewin1.exe"C:\Users\Admin\AppData\Local\ba3cc99d-fa16-4c31-9303-1b2017d34eac\updatewin1.exe"5⤵PID:1228
-
-
C:\Users\Admin\AppData\Local\ba3cc99d-fa16-4c31-9303-1b2017d34eac\updatewin2.exe"C:\Users\Admin\AppData\Local\ba3cc99d-fa16-4c31-9303-1b2017d34eac\updatewin2.exe"5⤵PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2066.exeC:\Users\Admin\AppData\Local\Temp\2066.exe1⤵PID:5600
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 2066.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2066.exe" & del C:\ProgramData\*.dll & exit2⤵PID:3620
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 2066.exe /f3⤵
- Kills process with taskkill
PID:6068
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:7556
-
-
-
C:\Users\Admin\AppData\Local\Temp\3B13.exeC:\Users\Admin\AppData\Local\Temp\3B13.exe1⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\57F3.exeC:\Users\Admin\AppData\Local\Temp\57F3.exe1⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\5AD2.exeC:\Users\Admin\AppData\Local\Temp\5AD2.exe1⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\7C07.exeC:\Users\Admin\AppData\Local\Temp\7C07.exe1⤵PID:7220
-
C:\Users\Admin\AppData\Local\Temp\88CA.exeC:\Users\Admin\AppData\Local\Temp\88CA.exe1⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\8B8A.exeC:\Users\Admin\AppData\Local\Temp\8B8A.exe1⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\9241.exeC:\Users\Admin\AppData\Local\Temp\9241.exe1⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\9E29.exeC:\Users\Admin\AppData\Local\Temp\9E29.exe1⤵PID:4956
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
3Web Service
1