Analysis
-
max time kernel
578s -
max time network
564s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
30-06-2021 07:26
Static task
static1
Behavioral task
behavioral1
Sample
028facff67136de55fe200177a190da625c8e1713b4e7d95bf5fc5412a5afffc.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
028facff67136de55fe200177a190da625c8e1713b4e7d95bf5fc5412a5afffc.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
d17c45b69bc45e17de1152841ebddb3a6abfe85202569fd5dea6b8d52a44c053.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
d17c45b69bc45e17de1152841ebddb3a6abfe85202569fd5dea6b8d52a44c053.exe
Resource
win10v20210410
General
-
Target
b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe
-
Size
1.8MB
-
MD5
7678217358637f0e5f06128dfdc7b3e4
-
SHA1
0867c058cdcf861deacde7ea2fcd2b589729a3b6
-
SHA256
b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093
-
SHA512
9880f2635237f22ee1da10bd766ebc9df28e73a5ff63191c5c5cd48f6f4ce13be96de0ce03cfdfe0307746258e739102a7aaf1a40d3719099832c5b5fdb770e6
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 37 3280 rundll32.exe 39 2568 WScript.exe 41 2568 WScript.exe 43 2568 WScript.exe 45 2568 WScript.exe 46 1580 rundll32.exe 49 1580 rundll32.exe 57 1580 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 196 Neghi.exe.com 1492 Neghi.exe.com 2548 OdrQmN.exe 3568 vpn.exe 208 4.exe 3472 Ritroverai.exe.com 3064 Ritroverai.exe.com 2660 SmartClock.exe 2824 yicfumdxu.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 4 IoCs
pid Process 2548 OdrQmN.exe 3280 rundll32.exe 3280 rundll32.exe 1580 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 3416 1580 rundll32.exe 108 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll OdrQmN.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll OdrQmN.exe File created C:\Program Files (x86)\foler\olader\acledit.dll OdrQmN.exe File created C:\PROGRA~3\Bklngfpngf\kgjocbpkfku.tmp rundll32.exe File created C:\PROGRA~3\Bklngfpngf\Vhxwcgzi.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 30 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Neghi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Neghi.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Ritroverai.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Ritroverai.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3724 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Ritroverai.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\327F54D1ED9BC4527F1A8A1735362B26453CA0A7 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\327F54D1ED9BC4527F1A8A1735362B26453CA0A7\Blob = 030000000100000014000000327f54d1ed9bc4527f1a8a1735362b26453ca0a720000000010000007802000030820274308201dda003020102020802d57c0134dd2278300d06092a864886f70d01010b0500305f3122302006035504030c1941413541204365727469666963617465205365727669636573311a3018060355040a0c11436f6d6f646f204341204c696d69746564310b30090603550406130247423110300e06035504070c0753616c666f7264301e170d3139303730313037333335385a170d3233303633303037333335385a305f3122302006035504030c1941413541204365727469666963617465205365727669636573311a3018060355040a0c11436f6d6f646f204341204c696d69746564310b30090603550406130247423110300e06035504070c0753616c666f726430819f300d06092a864886f70d010101050003818d0030818902818100ca7ee45f11a87de06156274faff29857c1ea76d751417c472b3d532c2ebda972f2baeca5702dd1b8db8736a21b21fb86b1197c13cda87b630731a4eab23a5660238ea2a0540425698616535b8036fcb6c9392a04901968e06d67baeb187aa0d0f5a3a095c7b6b1d910ff8078bd1f7068dbdea5c5807922f59850aae4c011f9690203010001a3393037300f0603551d130101ff040530030101ff30240603551d11041d301b821941413541204365727469666963617465205365727669636573300d06092a864886f70d01010b05000381810009779de50065a3230e7338f2d76b92d2c7d61dd44b6d6cfb35b55b05e4b22d8f708983f75ca3da694d98faa6ac5867d08f02830a182d81a23fca93ef21b27003eb9343da99d00e1cf7b6a8e26de79decc44d454f3ecf63869006b25d0102c133eb261b11e8d5955ed7ec7d7c2f44eda27e9ebd1077e0cadcb11e079196673476 rundll32.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3160 PING.EXE 3184 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 1580 rundll32.exe 2332 powershell.exe 2332 powershell.exe 2332 powershell.exe 1580 rundll32.exe 1580 rundll32.exe 1832 powershell.exe 1832 powershell.exe 1832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1580 rundll32.exe Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1492 Neghi.exe.com 1492 Neghi.exe.com 1580 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3516 3172 b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe 76 PID 3172 wrote to memory of 3516 3172 b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe 76 PID 3172 wrote to memory of 3516 3172 b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe 76 PID 3516 wrote to memory of 4004 3516 cmd.exe 78 PID 3516 wrote to memory of 4004 3516 cmd.exe 78 PID 3516 wrote to memory of 4004 3516 cmd.exe 78 PID 4004 wrote to memory of 3700 4004 cmd.exe 79 PID 4004 wrote to memory of 3700 4004 cmd.exe 79 PID 4004 wrote to memory of 3700 4004 cmd.exe 79 PID 4004 wrote to memory of 196 4004 cmd.exe 80 PID 4004 wrote to memory of 196 4004 cmd.exe 80 PID 4004 wrote to memory of 196 4004 cmd.exe 80 PID 4004 wrote to memory of 3160 4004 cmd.exe 81 PID 4004 wrote to memory of 3160 4004 cmd.exe 81 PID 4004 wrote to memory of 3160 4004 cmd.exe 81 PID 196 wrote to memory of 1492 196 Neghi.exe.com 82 PID 196 wrote to memory of 1492 196 Neghi.exe.com 82 PID 196 wrote to memory of 1492 196 Neghi.exe.com 82 PID 1492 wrote to memory of 3892 1492 Neghi.exe.com 86 PID 1492 wrote to memory of 3892 1492 Neghi.exe.com 86 PID 1492 wrote to memory of 3892 1492 Neghi.exe.com 86 PID 3892 wrote to memory of 2548 3892 cmd.exe 88 PID 3892 wrote to memory of 2548 3892 cmd.exe 88 PID 3892 wrote to memory of 2548 3892 cmd.exe 88 PID 2548 wrote to memory of 3568 2548 OdrQmN.exe 89 PID 2548 wrote to memory of 3568 2548 OdrQmN.exe 89 PID 2548 wrote to memory of 3568 2548 OdrQmN.exe 89 PID 2548 wrote to memory of 208 2548 OdrQmN.exe 90 PID 2548 wrote to memory of 208 2548 OdrQmN.exe 90 PID 2548 wrote to memory of 208 2548 OdrQmN.exe 90 PID 1492 wrote to memory of 2268 1492 Neghi.exe.com 91 PID 1492 wrote to memory of 2268 1492 Neghi.exe.com 91 PID 1492 wrote to memory of 2268 1492 Neghi.exe.com 91 PID 3568 wrote to memory of 2484 3568 vpn.exe 92 PID 3568 wrote to memory of 2484 3568 vpn.exe 92 PID 3568 wrote to memory of 2484 3568 vpn.exe 92 PID 2268 wrote to memory of 3724 2268 cmd.exe 96 PID 2268 wrote to memory of 3724 2268 cmd.exe 96 PID 2268 wrote to memory of 3724 2268 cmd.exe 96 PID 2484 wrote to memory of 3464 2484 cmd.exe 95 PID 2484 wrote to memory of 3464 2484 cmd.exe 95 PID 2484 wrote to memory of 3464 2484 cmd.exe 95 PID 3464 wrote to memory of 680 3464 cmd.exe 97 PID 3464 wrote to memory of 680 3464 cmd.exe 97 PID 3464 wrote to memory of 680 3464 cmd.exe 97 PID 3464 wrote to memory of 3472 3464 cmd.exe 98 PID 3464 wrote to memory of 3472 3464 cmd.exe 98 PID 3464 wrote to memory of 3472 3464 cmd.exe 98 PID 3464 wrote to memory of 3184 3464 cmd.exe 99 PID 3464 wrote to memory of 3184 3464 cmd.exe 99 PID 3464 wrote to memory of 3184 3464 cmd.exe 99 PID 3472 wrote to memory of 3064 3472 Ritroverai.exe.com 100 PID 3472 wrote to memory of 3064 3472 Ritroverai.exe.com 100 PID 3472 wrote to memory of 3064 3472 Ritroverai.exe.com 100 PID 208 wrote to memory of 2660 208 4.exe 101 PID 208 wrote to memory of 2660 208 4.exe 101 PID 208 wrote to memory of 2660 208 4.exe 101 PID 3064 wrote to memory of 2824 3064 Ritroverai.exe.com 103 PID 3064 wrote to memory of 2824 3064 Ritroverai.exe.com 103 PID 3064 wrote to memory of 2824 3064 Ritroverai.exe.com 103 PID 3064 wrote to memory of 2204 3064 Ritroverai.exe.com 104 PID 3064 wrote to memory of 2204 3064 Ritroverai.exe.com 104 PID 3064 wrote to memory of 2204 3064 Ritroverai.exe.com 104 PID 2824 wrote to memory of 3280 2824 yicfumdxu.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe"C:\Users\Admin\AppData\Local\Temp\b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Ero.avi2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^nwOhgkZOkTAuHApAkWLoGKlGITnVtOaFGtNDNpuScYUkDxTFlwfAaAQOQoFxMrJvBUmDMFNePTNIPZehqSKrmRhuhZNFEMysfbKJUdSFgjLnMoY$" Bellissima.avi4⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.comNeghi.exe.com f4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com f5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe"C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Ella.mid9⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd10⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ApgPFnDaQzNGcomssNqFbYhsjOZmoYlXyIDQobjHZzDEBDsixaEBxNGBWXCQntlRoQANFIoUAzFrcIPIbStQx$" Accade.mid11⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.comRitroverai.exe.com p11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.com p12⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\yicfumdxu.exe"C:\Users\Admin\AppData\Local\Temp\yicfumdxu.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\YICFUM~1.TMP,S C:\Users\Admin\AppData\Local\Temp\YICFUM~1.EXE14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
PID:3280 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\PROGRA~3\BKLNGF~1\KGJOCB~1.TMP,UzkadVBpRw== C:\Users\Admin\AppData\Local\Temp\YICFUM~1.TMP15⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1580 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 3180116⤵PID:3416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1515.tmp.ps1"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp27B5.tmp.ps1"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost17⤵PID:4036
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask16⤵PID:4008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask16⤵PID:1020
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dxvwqpkqve.vbs"13⤵PID:2204
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jwqyklelhu.vbs"13⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2568
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3011⤵
- Runs ping.exe
PID:3184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"8⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2660
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\osWauaoIuc & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com"6⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:3724
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:3160
-
-
-