Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
209s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27/07/2021, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
Anime-Fighters-Simul_763412721.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Anime-Fighters-Simul_763412721.exe
Resource
win10v20210408
General
-
Target
Anime-Fighters-Simul_763412721.exe
-
Size
4.8MB
-
MD5
ab3ad490f762ba671cdee4ecc0f5344d
-
SHA1
1d9d83af66e77ab20b1ff0bbafbe47522b3d3395
-
SHA256
b46e0391b8f48919100497997b8088126ef73815147fcc57cb5dc81ad97a226f
-
SHA512
fd2fe04d536a78428dcb9ee49ab4dd0fd739f30ee1198d8a502200d596edb32095c649433fad38fcf5320a5d852a2ef2109df344f1cb11fd9e25173ac1e62377
Malware Config
Extracted
redline
230721
cookiebrokrash.info:80
Extracted
redline
pokatak1111
qusenero.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/2176-160-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2176-161-0x000000000041884A-mapping.dmp family_redline behavioral1/memory/2176-162-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2584-168-0x00000000003E0000-0x00000000003FB000-memory.dmp family_redline behavioral1/memory/2584-169-0x0000000000770000-0x000000000078A000-memory.dmp family_redline -
Blocklisted process makes network request 64 IoCs
flow pid Process 53 1076 MsiExec.exe 55 1076 MsiExec.exe 56 1076 MsiExec.exe 59 1076 MsiExec.exe 61 1076 MsiExec.exe 63 1076 MsiExec.exe 65 1076 MsiExec.exe 68 1076 MsiExec.exe 69 1076 MsiExec.exe 70 1076 MsiExec.exe 71 1076 MsiExec.exe 72 1076 MsiExec.exe 73 1076 MsiExec.exe 74 1076 MsiExec.exe 75 1076 MsiExec.exe 76 1076 MsiExec.exe 77 1076 MsiExec.exe 80 1076 MsiExec.exe 81 1076 MsiExec.exe 82 1076 MsiExec.exe 83 1076 MsiExec.exe 84 1076 MsiExec.exe 85 1076 MsiExec.exe 86 1076 MsiExec.exe 87 1076 MsiExec.exe 88 1076 MsiExec.exe 89 1076 MsiExec.exe 92 1076 MsiExec.exe 93 1076 MsiExec.exe 94 1076 MsiExec.exe 95 1076 MsiExec.exe 96 1076 MsiExec.exe 97 1076 MsiExec.exe 98 1076 MsiExec.exe 99 1076 MsiExec.exe 100 1076 MsiExec.exe 101 1076 MsiExec.exe 103 1076 MsiExec.exe 104 1076 MsiExec.exe 105 1076 MsiExec.exe 106 1076 MsiExec.exe 107 1076 MsiExec.exe 108 1076 MsiExec.exe 109 1076 MsiExec.exe 110 1076 MsiExec.exe 111 1076 MsiExec.exe 112 1076 MsiExec.exe 113 1076 MsiExec.exe 114 1076 MsiExec.exe 115 1076 MsiExec.exe 116 1076 MsiExec.exe 117 1076 MsiExec.exe 118 1076 MsiExec.exe 119 1076 MsiExec.exe 120 1076 MsiExec.exe 121 1076 MsiExec.exe 122 1076 MsiExec.exe 123 1076 MsiExec.exe 124 1076 MsiExec.exe 126 1076 MsiExec.exe 128 1076 MsiExec.exe 129 1076 MsiExec.exe 130 1076 MsiExec.exe 131 1076 MsiExec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 1864 Anime-Fighters-Simul_763412721.tmp 1528 Aut.exe 992 oDIW8y.exe 1664 nCm9CTHygrwIE.exe 1948 0Q6v9NNiTo.exe 1688 komarjoba.exe 2176 komarjoba.exe 2584 kamarjoba.exe 1316 AdvancedWindowsManager.exe 2552 AdvancedWindowsManager.exe 2592 AdvancedWindowsManager.exe 2736 AdvancedWindowsManager.exe 1276 AdvancedWindowsManager.exe 5320 AdvancedWindowsManager.exe -
Loads dropped DLL 49 IoCs
pid Process 528 Anime-Fighters-Simul_763412721.exe 1864 Anime-Fighters-Simul_763412721.tmp 1864 Anime-Fighters-Simul_763412721.tmp 1528 Aut.exe 1528 Aut.exe 1528 Aut.exe 1528 Aut.exe 1948 0Q6v9NNiTo.exe 1948 0Q6v9NNiTo.exe 1948 0Q6v9NNiTo.exe 384 MsiExec.exe 384 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 1664 nCm9CTHygrwIE.exe 1076 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 1688 komarjoba.exe 1076 MsiExec.exe 1948 0Q6v9NNiTo.exe 1076 MsiExec.exe 1076 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 2276 MsiExec.exe 1076 MsiExec.exe 1664 nCm9CTHygrwIE.exe 1664 nCm9CTHygrwIE.exe 1084 taskeng.exe 1084 taskeng.exe 1084 taskeng.exe 2544 Process not Found 2576 Process not Found 1084 taskeng.exe 2620 Process not Found 1084 taskeng.exe 1084 taskeng.exe 3680 Process not Found 3788 Process not Found 1084 taskeng.exe 5380 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 0Q6v9NNiTo.exe File opened (read-only) \??\S: 0Q6v9NNiTo.exe File opened (read-only) \??\T: 0Q6v9NNiTo.exe File opened (read-only) \??\U: 0Q6v9NNiTo.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: 0Q6v9NNiTo.exe File opened (read-only) \??\M: 0Q6v9NNiTo.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: 0Q6v9NNiTo.exe File opened (read-only) \??\N: 0Q6v9NNiTo.exe File opened (read-only) \??\W: 0Q6v9NNiTo.exe File opened (read-only) \??\X: 0Q6v9NNiTo.exe File opened (read-only) \??\Z: 0Q6v9NNiTo.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: 0Q6v9NNiTo.exe File opened (read-only) \??\O: 0Q6v9NNiTo.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: 0Q6v9NNiTo.exe File opened (read-only) \??\P: 0Q6v9NNiTo.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: 0Q6v9NNiTo.exe File opened (read-only) \??\E: 0Q6v9NNiTo.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: 0Q6v9NNiTo.exe File opened (read-only) \??\L: 0Q6v9NNiTo.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: 0Q6v9NNiTo.exe File opened (read-only) \??\Y: 0Q6v9NNiTo.exe File opened (read-only) \??\V: 0Q6v9NNiTo.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: 0Q6v9NNiTo.exe File opened (read-only) \??\Q: 0Q6v9NNiTo.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2176 1688 komarjoba.exe 46 -
autoit_exe 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000300000001310c-84.dat autoit_exe behavioral1/files/0x000300000001310c-82.dat autoit_exe behavioral1/files/0x000300000001310c-86.dat autoit_exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File created C:\Program Files (x86)\Est\alias\is-HD1A8.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\commodi\is-A0C7B.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\is-A0R2I.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\alias\is-P4UFS.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\commodi\is-S044U.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\commodi\is-A0425.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\qui\is-8GVC2.tmp Anime-Fighters-Simul_763412721.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File created C:\Program Files (x86)\Est\is-AED97.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\is-CIPI7.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\is-MNC57.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\alias\is-466LG.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File created C:\Program Files (x86)\Est\alias\is-G16T8.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\qui\is-CCITH.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\qui\is-1NKUV.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\is-7RVA8.tmp Anime-Fighters-Simul_763412721.tmp File opened for modification C:\Program Files (x86)\Est\unins000.dat Anime-Fighters-Simul_763412721.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File created C:\Program Files (x86)\Est\is-P7K4R.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\alias\is-BQQJ4.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\earum\is-PNL2H.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\qui\is-SP9BL.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\qui\is-3UTGQ.tmp Anime-Fighters-Simul_763412721.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File created C:\Program Files (x86)\Est\alias\is-FF1CO.tmp Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File opened for modification C:\Program Files (x86)\Est\Aut.exe Anime-Fighters-Simul_763412721.tmp File opened for modification C:\Program Files (x86)\Est\sqlite3.dll Anime-Fighters-Simul_763412721.tmp File created C:\Program Files (x86)\Est\unins000.dat Anime-Fighters-Simul_763412721.tmp -
Drops file in Windows directory 30 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIDE2A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE300.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE38D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE3EC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE43B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE499.tmp msiexec.exe File created C:\Windows\Installer\f76cf60.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE205.tmp msiexec.exe File created C:\Windows\Installer\f76cf64.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID5F8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID695.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID7AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE4F8.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSID984.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDBF6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE651.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID2BC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID899.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDD2F.tmp msiexec.exe File created C:\Windows\Installer\f76cf62.ipi msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\f76cf62.ipi msiexec.exe File opened for modification C:\Windows\Installer\f76cf60.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDAFC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE08D.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIE07C.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1556 taskkill.exe 2732 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01165efec82d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003b435477f82e26419227293536d1098d0000000002000000000010660000000100002000000099dd3d76eca7ba4c46244a816e9bb974f43b28fd1f5fc4d47026bfaf7cf5bd29000000000e8000000002000020000000f5b0cc8250b1200f3ca4e7c174aaf3815ab657499a15cc2861bce945fb4a50fe20000000efc7bbbbc5675656bc69b35e1b86b6e6b6f43c0638f55f27971d1e1632a004a04000000038f47272e4d499698d3d6e8dfc5f98e8cd01a53cda1045b84e95ec8e105ae315297a76e2ed031f4cc8ce6d7b89c45ded744ef83f116dc4b0190ed6c1de11a950 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{185C6931-EEE0-11EB-9C72-EA91F6580701} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\26 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25 msiexec.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductName = "Windows Manager" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductIcon = "C:\\Windows\\Installer\\{C845414C-903C-4218-9DE7-132AB97FDF62}\\logo.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "6BBF4B2F4524B25478C17BFBEE2559F7" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\PackageName = "Windows Manager - Postback Y.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net msiexec.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 0Q6v9NNiTo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 0Q6v9NNiTo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 0Q6v9NNiTo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Aut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 0Q6v9NNiTo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0Q6v9NNiTo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0Q6v9NNiTo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 0Q6v9NNiTo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Aut.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1680 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1864 Anime-Fighters-Simul_763412721.tmp 1864 Anime-Fighters-Simul_763412721.tmp 1528 Aut.exe 1528 Aut.exe 1528 Aut.exe 384 MsiExec.exe 1076 MsiExec.exe 1076 MsiExec.exe 432 msiexec.exe 432 msiexec.exe 2584 kamarjoba.exe 2584 kamarjoba.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 432 msiexec.exe Token: SeTakeOwnershipPrivilege 432 msiexec.exe Token: SeSecurityPrivilege 432 msiexec.exe Token: SeCreateTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeAssignPrimaryTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeLockMemoryPrivilege 1948 0Q6v9NNiTo.exe Token: SeIncreaseQuotaPrivilege 1948 0Q6v9NNiTo.exe Token: SeMachineAccountPrivilege 1948 0Q6v9NNiTo.exe Token: SeTcbPrivilege 1948 0Q6v9NNiTo.exe Token: SeSecurityPrivilege 1948 0Q6v9NNiTo.exe Token: SeTakeOwnershipPrivilege 1948 0Q6v9NNiTo.exe Token: SeLoadDriverPrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemProfilePrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemtimePrivilege 1948 0Q6v9NNiTo.exe Token: SeProfSingleProcessPrivilege 1948 0Q6v9NNiTo.exe Token: SeIncBasePriorityPrivilege 1948 0Q6v9NNiTo.exe Token: SeCreatePagefilePrivilege 1948 0Q6v9NNiTo.exe Token: SeCreatePermanentPrivilege 1948 0Q6v9NNiTo.exe Token: SeBackupPrivilege 1948 0Q6v9NNiTo.exe Token: SeRestorePrivilege 1948 0Q6v9NNiTo.exe Token: SeShutdownPrivilege 1948 0Q6v9NNiTo.exe Token: SeDebugPrivilege 1948 0Q6v9NNiTo.exe Token: SeAuditPrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemEnvironmentPrivilege 1948 0Q6v9NNiTo.exe Token: SeChangeNotifyPrivilege 1948 0Q6v9NNiTo.exe Token: SeRemoteShutdownPrivilege 1948 0Q6v9NNiTo.exe Token: SeUndockPrivilege 1948 0Q6v9NNiTo.exe Token: SeSyncAgentPrivilege 1948 0Q6v9NNiTo.exe Token: SeEnableDelegationPrivilege 1948 0Q6v9NNiTo.exe Token: SeManageVolumePrivilege 1948 0Q6v9NNiTo.exe Token: SeImpersonatePrivilege 1948 0Q6v9NNiTo.exe Token: SeCreateGlobalPrivilege 1948 0Q6v9NNiTo.exe Token: SeCreateTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeAssignPrimaryTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeLockMemoryPrivilege 1948 0Q6v9NNiTo.exe Token: SeIncreaseQuotaPrivilege 1948 0Q6v9NNiTo.exe Token: SeMachineAccountPrivilege 1948 0Q6v9NNiTo.exe Token: SeTcbPrivilege 1948 0Q6v9NNiTo.exe Token: SeSecurityPrivilege 1948 0Q6v9NNiTo.exe Token: SeTakeOwnershipPrivilege 1948 0Q6v9NNiTo.exe Token: SeLoadDriverPrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemProfilePrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemtimePrivilege 1948 0Q6v9NNiTo.exe Token: SeProfSingleProcessPrivilege 1948 0Q6v9NNiTo.exe Token: SeIncBasePriorityPrivilege 1948 0Q6v9NNiTo.exe Token: SeCreatePagefilePrivilege 1948 0Q6v9NNiTo.exe Token: SeCreatePermanentPrivilege 1948 0Q6v9NNiTo.exe Token: SeBackupPrivilege 1948 0Q6v9NNiTo.exe Token: SeRestorePrivilege 1948 0Q6v9NNiTo.exe Token: SeShutdownPrivilege 1948 0Q6v9NNiTo.exe Token: SeDebugPrivilege 1948 0Q6v9NNiTo.exe Token: SeAuditPrivilege 1948 0Q6v9NNiTo.exe Token: SeSystemEnvironmentPrivilege 1948 0Q6v9NNiTo.exe Token: SeChangeNotifyPrivilege 1948 0Q6v9NNiTo.exe Token: SeRemoteShutdownPrivilege 1948 0Q6v9NNiTo.exe Token: SeUndockPrivilege 1948 0Q6v9NNiTo.exe Token: SeSyncAgentPrivilege 1948 0Q6v9NNiTo.exe Token: SeEnableDelegationPrivilege 1948 0Q6v9NNiTo.exe Token: SeManageVolumePrivilege 1948 0Q6v9NNiTo.exe Token: SeImpersonatePrivilege 1948 0Q6v9NNiTo.exe Token: SeCreateGlobalPrivilege 1948 0Q6v9NNiTo.exe Token: SeCreateTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeAssignPrimaryTokenPrivilege 1948 0Q6v9NNiTo.exe Token: SeLockMemoryPrivilege 1948 0Q6v9NNiTo.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1864 Anime-Fighters-Simul_763412721.tmp 1948 0Q6v9NNiTo.exe 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 528 wrote to memory of 1864 528 Anime-Fighters-Simul_763412721.exe 28 PID 1864 wrote to memory of 1528 1864 Anime-Fighters-Simul_763412721.tmp 30 PID 1864 wrote to memory of 1528 1864 Anime-Fighters-Simul_763412721.tmp 30 PID 1864 wrote to memory of 1528 1864 Anime-Fighters-Simul_763412721.tmp 30 PID 1864 wrote to memory of 1528 1864 Anime-Fighters-Simul_763412721.tmp 30 PID 1528 wrote to memory of 992 1528 Aut.exe 33 PID 1528 wrote to memory of 992 1528 Aut.exe 33 PID 1528 wrote to memory of 992 1528 Aut.exe 33 PID 1528 wrote to memory of 992 1528 Aut.exe 33 PID 1528 wrote to memory of 1664 1528 Aut.exe 34 PID 1528 wrote to memory of 1664 1528 Aut.exe 34 PID 1528 wrote to memory of 1664 1528 Aut.exe 34 PID 1528 wrote to memory of 1664 1528 Aut.exe 34 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 1528 wrote to memory of 1948 1528 Aut.exe 35 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 432 wrote to memory of 384 432 msiexec.exe 38 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 1948 wrote to memory of 968 1948 0Q6v9NNiTo.exe 40 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 432 wrote to memory of 1076 432 msiexec.exe 41 PID 1076 wrote to memory of 1556 1076 MsiExec.exe 42 PID 1076 wrote to memory of 1556 1076 MsiExec.exe 42 PID 1076 wrote to memory of 1556 1076 MsiExec.exe 42 PID 1076 wrote to memory of 1556 1076 MsiExec.exe 42 PID 1664 wrote to memory of 1688 1664 nCm9CTHygrwIE.exe 44 PID 1664 wrote to memory of 1688 1664 nCm9CTHygrwIE.exe 44 PID 1664 wrote to memory of 1688 1664 nCm9CTHygrwIE.exe 44 PID 1664 wrote to memory of 1688 1664 nCm9CTHygrwIE.exe 44 PID 1688 wrote to memory of 2176 1688 komarjoba.exe 46 PID 1688 wrote to memory of 2176 1688 komarjoba.exe 46 PID 1688 wrote to memory of 2176 1688 komarjoba.exe 46 PID 1688 wrote to memory of 2176 1688 komarjoba.exe 46 PID 432 wrote to memory of 2276 432 msiexec.exe 47 PID 432 wrote to memory of 2276 432 msiexec.exe 47 PID 432 wrote to memory of 2276 432 msiexec.exe 47 PID 432 wrote to memory of 2276 432 msiexec.exe 47 PID 432 wrote to memory of 2276 432 msiexec.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Simul_763412721.exe"C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Simul_763412721.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\is-D23IP.tmp\Anime-Fighters-Simul_763412721.tmp"C:\Users\Admin\AppData\Local\Temp\is-D23IP.tmp\Anime-Fighters-Simul_763412721.tmp" /SL5="$4015E,4323544,721408,C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Simul_763412721.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Est\Aut.exe"C:\Program Files (x86)\Est/\Aut.exe" 1e7e5d00b14bf80042c84dafb2bca0153⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\kl6eSRam\oDIW8y.exeC:\Users\Admin\AppData\Local\Temp\kl6eSRam\oDIW8y.exe /usthree SUB=1e7e5d00b14bf80042c84dafb2bca0154⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "oDIW8y.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\kl6eSRam\oDIW8y.exe" & exit5⤵PID:2700
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "oDIW8y.exe" /f6⤵
- Kills process with taskkill
PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6N4e2ZUU\nCm9CTHygrwIE.exeC:\Users\Admin\AppData\Local\Temp\6N4e2ZUU\nCm9CTHygrwIE.exe /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeC:\Users\Admin\AppData\Local\Temp\komarjoba.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeC:\Users\Admin\AppData\Local\Temp\komarjoba.exe6⤵
- Executes dropped EXE
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\kamarjoba.exeC:\Users\Admin\AppData\Local\Temp\kamarjoba.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.binance.com/en/register?ref=WDA8929C5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\6N4e2ZUU\nCm9CTHygrwIE.exe & exit5⤵PID:468
-
C:\Windows\SysWOW64\PING.EXEping 06⤵
- Runs ping.exe
PID:1680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E4xeDt0y\0Q6v9NNiTo.exeC:\Users\Admin\AppData\Local\Temp\E4xeDt0y\0Q6v9NNiTo.exe /qn CAMPAIGN="642"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=642 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\E4xeDt0y\0Q6v9NNiTo.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\E4xeDt0y\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1627133715 /qn CAMPAIGN=""642"" " CAMPAIGN="642"5⤵PID:968
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7DFC17BB24C73242A8C0DE71D0868529 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C15A5151EA71D0868C8176B75434C9202⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:1556
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 24DFC157A9D9872FADA55185050E525E M Global\MSI00002⤵
- Loads dropped DLL
PID:2276
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b41⤵PID:2876
-
C:\Windows\system32\taskeng.exetaskeng.exe {C43A6970-C950-4C1B-9878-4AAEF02990E3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:1084 -
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 115 -t 80802⤵
- Executes dropped EXE
PID:1316
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 114 -t 80802⤵
- Executes dropped EXE
PID:2552
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 113 -t 80802⤵
- Executes dropped EXE
PID:2592
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 112 -t 80802⤵
- Executes dropped EXE
PID:2736
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 111 -t 80802⤵
- Executes dropped EXE
PID:1276
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 110 -t 80802⤵
- Executes dropped EXE
PID:5320
-