Analysis
-
max time kernel
7s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-06-2021 23:02
Static task
static1
Behavioral task
behavioral1
Sample
3CC70977F094F02DAB75E1F9F03B241F.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
3CC70977F094F02DAB75E1F9F03B241F.exe
Resource
win10v20210410
General
-
Target
3CC70977F094F02DAB75E1F9F03B241F.exe
-
Size
3.5MB
-
MD5
3cc70977f094f02dab75e1f9f03b241f
-
SHA1
ddc55a0d58fefdcbef71ea5619a3aeeaf758936c
-
SHA256
3f53579a490ec07fe7518fdbae105b2dd4192e5ca2234af801d7ecfe42be3179
-
SHA512
11425ac5e5bbca82ca37d4ec545468a12ce5ac03ea83be2b5e1828beb829c95cd3fd652b4470a831cf256d53fde5af916224eb60d50050ecffd7ce6eabb222ca
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1856-188-0x0000000000950000-0x00000000009ED000-memory.dmp family_vidar behavioral1/memory/1856-194-0x0000000000400000-0x0000000000950000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x0003000000013117-68.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-70.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-69.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-72.dat aspack_v212_v242 behavioral1/files/0x000300000001310c-73.dat aspack_v212_v242 behavioral1/files/0x000300000001310c-74.dat aspack_v212_v242 behavioral1/files/0x000300000001310a-75.dat aspack_v212_v242 behavioral1/files/0x000300000001310a-76.dat aspack_v212_v242 behavioral1/files/0x0003000000013113-81.dat aspack_v212_v242 behavioral1/files/0x0003000000013113-82.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-84.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-85.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-87.dat aspack_v212_v242 behavioral1/files/0x0003000000013117-86.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 848 setup_installer.exe 1604 setup_install.exe 992 sonia_4.exe 1856 sonia_3.exe 2040 sonia_6.exe 2016 sonia_5.exe 1700 sonia_2.exe 1320 sonia_7.exe 1432 sonia_8.exe 1548 sonia_1.exe 1832 sonia_8.tmp -
Loads dropped DLL 41 IoCs
pid Process 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 1604 setup_install.exe 2000 cmd.exe 2000 cmd.exe 1556 cmd.exe 1876 cmd.exe 1568 cmd.exe 1512 cmd.exe 1512 cmd.exe 1856 sonia_3.exe 1856 sonia_3.exe 992 sonia_4.exe 992 sonia_4.exe 1952 cmd.exe 1952 cmd.exe 1784 cmd.exe 2040 sonia_6.exe 2040 sonia_6.exe 1700 sonia_2.exe 1700 sonia_2.exe 1516 cmd.exe 1320 sonia_7.exe 1320 sonia_7.exe 1548 sonia_1.exe 1548 sonia_1.exe 1432 sonia_8.exe 1432 sonia_8.exe 1432 sonia_8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io 12 ip-api.com 185 api.ipify.org 4 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2720 1856 WerFault.exe 45 3784 2768 WerFault.exe 74 3852 3008 WerFault.exe 84 -
Kills process with taskkill 1 IoCs
pid Process 3368 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 sonia_5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 1944 wrote to memory of 848 1944 3CC70977F094F02DAB75E1F9F03B241F.exe 29 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 848 wrote to memory of 1604 848 setup_installer.exe 30 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1516 1604 setup_install.exe 32 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 1952 1604 setup_install.exe 33 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 2000 1604 setup_install.exe 48 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1556 1604 setup_install.exe 47 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1568 1604 setup_install.exe 46 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1876 1604 setup_install.exe 34 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 1604 wrote to memory of 1512 1604 setup_install.exe 35 PID 2000 wrote to memory of 1856 2000 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3CC70977F094F02DAB75E1F9F03B241F.exe"C:\Users\Admin\AppData\Local\Temp\3CC70977F094F02DAB75E1F9F03B241F.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS053AE075\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Loads dropped DLL
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_1.exesonia_1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub6⤵PID:864
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_2.exesonia_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Loads dropped DLL
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_6.exesonia_6.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\Documents\6VW2lFJuKUs8eH__FdPabHSO.exe"C:\Users\Admin\Documents\6VW2lFJuKUs8eH__FdPabHSO.exe"6⤵PID:2192
-
-
C:\Users\Admin\Documents\w6FTN1MdK_EaZBm8H69HdIyd.exe"C:\Users\Admin\Documents\w6FTN1MdK_EaZBm8H69HdIyd.exe"6⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2428
-
-
-
C:\Users\Admin\Documents\CioKqh1E5auQTomXRHcAsDaS.exe"C:\Users\Admin\Documents\CioKqh1E5auQTomXRHcAsDaS.exe"6⤵PID:2164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru7⤵PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2534f50,0x7fef2534f60,0x7fef2534f708⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=992 /prefetch:28⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1336 /prefetch:88⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 /prefetch:88⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1224 /prefetch:18⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1216 /prefetch:18⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1180 /prefetch:28⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2440 /prefetch:18⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:18⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2592 /prefetch:18⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:18⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3444 /prefetch:88⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=988,5936312071559346770,8636594661950524986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=588 /prefetch:88⤵PID:3940
-
-
-
-
C:\Users\Admin\Documents\SL9X8FQ9FCdQ7dhjB8gZwf2l.exe"C:\Users\Admin\Documents\SL9X8FQ9FCdQ7dhjB8gZwf2l.exe"6⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\61701650594.exe"7⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\61701650594.exe"C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\61701650594.exe"8⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\61701650594.exe"C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\61701650594.exe"9⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\1625014920678.exe"C:\Users\Admin\AppData\Local\Temp\1625014920678.exe"10⤵PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\97882894494.exe" /mix7⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\97882894494.exe"C:\Users\Admin\AppData\Local\Temp\{uQBw-R6boC-qCRF-xFvoO}\97882894494.exe" /mix8⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "SL9X8FQ9FCdQ7dhjB8gZwf2l.exe" /f & erase "C:\Users\Admin\Documents\SL9X8FQ9FCdQ7dhjB8gZwf2l.exe" & exit7⤵PID:3096
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "SL9X8FQ9FCdQ7dhjB8gZwf2l.exe" /f8⤵
- Kills process with taskkill
PID:3368
-
-
-
-
C:\Users\Admin\Documents\jvAfUeYDYoViGo4Ufz8v0G6L.exe"C:\Users\Admin\Documents\jvAfUeYDYoViGo4Ufz8v0G6L.exe"6⤵PID:2124
-
-
C:\Users\Admin\Documents\7RU_roGu_0FS4n5jMg5PozSM.exe"C:\Users\Admin\Documents\7RU_roGu_0FS4n5jMg5PozSM.exe"6⤵PID:2116
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"7⤵PID:2656
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"7⤵PID:2740
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2592
-
-
-
-
C:\Users\Admin\Documents\IeVAzx0BD56zU1RkNVtteiou.exe"C:\Users\Admin\Documents\IeVAzx0BD56zU1RkNVtteiou.exe"6⤵PID:2224
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub7⤵PID:2620
-
-
-
C:\Users\Admin\Documents\xp8Tgud848WlidNSIFqP1EYn.exe"C:\Users\Admin\Documents\xp8Tgud848WlidNSIFqP1EYn.exe"6⤵PID:2232
-
-
C:\Users\Admin\Documents\i7Ou_NsSDL4bSi2F7oezQk3u.exe"C:\Users\Admin\Documents\i7Ou_NsSDL4bSi2F7oezQk3u.exe"6⤵PID:2276
-
-
C:\Users\Admin\Documents\8Y6tRXc1I8LsLU7tdf7CWNc4.exe"C:\Users\Admin\Documents\8Y6tRXc1I8LsLU7tdf7CWNc4.exe"6⤵PID:2248
-
-
C:\Users\Admin\Documents\8vL9PPqt6SCgwJKAlw84DEZS.exe"C:\Users\Admin\Documents\8vL9PPqt6SCgwJKAlw84DEZS.exe"6⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 9727⤵
- Program crash
PID:3784
-
-
-
C:\Users\Admin\Documents\aHkoW2Kp2cShrmf662QfBkJN.exe"C:\Users\Admin\Documents\aHkoW2Kp2cShrmf662QfBkJN.exe"6⤵PID:2756
-
-
C:\Users\Admin\Documents\Nc4X7hJZshWXNBc5HV5EQLEW.exe"C:\Users\Admin\Documents\Nc4X7hJZshWXNBc5HV5EQLEW.exe"6⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 9527⤵
- Program crash
PID:3852
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵
- Loads dropped DLL
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_7.exesonia_7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_8.exe4⤵
- Loads dropped DLL
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_8.exesonia_8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Loads dropped DLL
PID:1568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Loads dropped DLL
PID:1556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-9S0OK.tmp\sonia_8.tmp"C:\Users\Admin\AppData\Local\Temp\is-9S0OK.tmp\sonia_8.tmp" /SL5="$60128,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_8.exe"1⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\is-QMG54.tmp\bkhgbà _ç-.exe"C:\Users\Admin\AppData\Local\Temp\is-QMG54.tmp\bkhgbà _ç-.exe" /S /UID=lab2122⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_5.exesonia_5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Users\Admin\AppData\Roaming\3858345.exe"C:\Users\Admin\AppData\Roaming\3858345.exe"2⤵PID:2480
-
-
C:\Users\Admin\AppData\Roaming\5208496.exe"C:\Users\Admin\AppData\Roaming\5208496.exe"2⤵PID:2552
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵PID:1760
-
-
-
C:\Users\Admin\AppData\Roaming\3374976.exe"C:\Users\Admin\AppData\Roaming\3374976.exe"2⤵PID:2808
-
-
C:\Users\Admin\AppData\Roaming\1885045.exe"C:\Users\Admin\AppData\Roaming\1885045.exe"2⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_4.exesonia_4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\7zS053AE075\sonia_3.exesonia_3.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 9682⤵
- Program crash
PID:2720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1612