Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-08-2021 14:05
Static task
static1
Behavioral task
behavioral1
Sample
Loader-IDB.exe
Resource
win10v20210410
General
-
Target
Loader-IDB.exe
-
Size
2.0MB
-
MD5
fe4f22e8d5f3a4b2bcd81bd69429c12b
-
SHA1
50eec07da09636ab7108e93a2a17224724d5f8c2
-
SHA256
e0fb9bf9bd903a2ea4bc952b168482bd15af73dd1b4ae47529aa10fe6a9112a0
-
SHA512
6295463804ae0b84e90a6dc04d4a673fce7eea5c8f3a9017aae52eb4ea6c0a522e94fe8f9b5403cd42449a78aac438d0d53e44457581d67c4cd94886054b0ef2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\stream.exe\"," regasm.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor Payload 3 IoCs
resource yara_rule behavioral1/memory/3796-143-0x00000000005F5A70-mapping.dmp family_webmonitor behavioral1/memory/3340-214-0x00000000005F5A70-mapping.dmp family_webmonitor behavioral1/memory/1300-218-0x00000000005F5A70-mapping.dmp family_webmonitor -
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
Executes dropped EXE 16 IoCs
pid Process 2596 Anyname.exe 2980 Patch.exe 4080 MSBuild.exe 1872 MSBuild.exe 3796 MSBuild.exe 3452 Anyname.exe 1208 Patch.exe 628 MSBuild.exe 1636 MSBuild.exe 4012 MSBuild.exe 1896 MSBuild.exe 3408 revpe.exe 996 Anyname.exe 2116 Patch.exe 3340 MSBuild.exe 1300 MSBuild.exe -
resource yara_rule behavioral1/files/0x000200000001ab5b-118.dat upx behavioral1/files/0x000200000001ab5b-119.dat upx behavioral1/memory/3796-142-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/memory/3796-145-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral1/files/0x000200000001ab5b-151.dat upx behavioral1/files/0x000200000001ab5b-156.dat upx behavioral1/memory/628-166-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/files/0x000200000001ab5b-183.dat upx behavioral1/files/0x000200000001ab5b-185.dat upx behavioral1/memory/628-190-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 2980 Patch.exe 1208 Patch.exe 2116 Patch.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe頀" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe쌀" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe쌀" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe\uf800" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe\uf800" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WM-934e = "C:\\Users\\Admin\\AppData\\Roaming\\WM-934e.exe頀" MSBuild.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 3984 set thread context of 3836 3984 Loader-IDB.exe 78 PID 3836 set thread context of 3796 3836 regasm.exe 86 PID 2092 set thread context of 3564 2092 Loader-IDB.exe 97 PID 3796 set thread context of 628 3796 MSBuild.exe 98 PID 3796 set thread context of 1636 3796 MSBuild.exe 99 PID 3796 set thread context of 4012 3796 MSBuild.exe 101 PID 3796 set thread context of 3408 3796 MSBuild.exe 102 PID 2720 set thread context of 1208 2720 Loader-IDB.exe 110 PID 3564 set thread context of 3340 3564 regasm.exe 111 PID 1208 set thread context of 1300 1208 regasm.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002db8787de6c18245a4477682a4fed7d400000000020000000000106600000001000020000000e410d941c3a3f17cbded265b1d2a16a0ff544235f8debc6f4021d83401dc4c91000000000e8000000002000020000000c07dc194060e67d5eb48054ed089dca58a8c9dad45af0ac63ed95dab60a6d6fb200000003858a5c9fa41e283642f1e390f87528d266760b538a89e1314c6a961949336704000000083bf3d10d5993242d3fa4acd881f0d384211252c165d5a6b9c1639edbe69c20ad729b9438baa9fdb42e4615e9050022396a284beb31877ad7879a3635763a8d5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A93EDB6-FC40-11EB-A11C-EE56847A1D14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002db8787de6c18245a4477682a4fed7d4000000000200000000001066000000010000200000007e526ccd52ff447705e15574c0dd40ffddc77b832185f0cdd13343600a00524c000000000e80000000020000200000002a785375671b67e0d2ee4fbe4ff50ffb2df284d5d83dcef67226184919c3273520000000ec40da2f9faa538e5d8cef88e36dd77e22f33dc8fbc07b8984802aa2b3f2829640000000bb272e95e60dd3cdf6c852f1cd538c16da5b7dc6da30e880b3d5086830f1dac1519e4b1679c6b87a74cb87a473acbee1ad2b1d471e757d603bf531828a479a01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30904397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b003ee6f4d90d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1864129039" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1864129039" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a6d86f4d90d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30904397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3192 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3984 Loader-IDB.exe 2092 Loader-IDB.exe 2092 Loader-IDB.exe 2720 Loader-IDB.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3192 taskmgr.exe Token: SeSystemProfilePrivilege 3192 taskmgr.exe Token: SeCreateGlobalPrivilege 3192 taskmgr.exe Token: SeDebugPrivilege 3836 regasm.exe Token: SeDebugPrivilege 3796 MSBuild.exe Token: SeShutdownPrivilege 3796 MSBuild.exe Token: SeCreatePagefilePrivilege 3796 MSBuild.exe Token: SeDebugPrivilege 3564 regasm.exe Token: SeDebugPrivilege 1208 regasm.exe Token: SeDebugPrivilege 3340 MSBuild.exe Token: SeShutdownPrivilege 3340 MSBuild.exe Token: SeCreatePagefilePrivilege 3340 MSBuild.exe Token: SeDebugPrivilege 1300 MSBuild.exe Token: SeShutdownPrivilege 1300 MSBuild.exe Token: SeCreatePagefilePrivilege 1300 MSBuild.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe 3192 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3984 Loader-IDB.exe 2092 Loader-IDB.exe 3796 MSBuild.exe 2720 Loader-IDB.exe 644 iexplore.exe 644 iexplore.exe 4036 IEXPLORE.EXE 4036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 2596 3984 Loader-IDB.exe 76 PID 3984 wrote to memory of 2596 3984 Loader-IDB.exe 76 PID 3984 wrote to memory of 2596 3984 Loader-IDB.exe 76 PID 2596 wrote to memory of 2980 2596 Anyname.exe 77 PID 2596 wrote to memory of 2980 2596 Anyname.exe 77 PID 2596 wrote to memory of 2980 2596 Anyname.exe 77 PID 3984 wrote to memory of 3836 3984 Loader-IDB.exe 78 PID 3984 wrote to memory of 3836 3984 Loader-IDB.exe 78 PID 3984 wrote to memory of 3836 3984 Loader-IDB.exe 78 PID 3984 wrote to memory of 3836 3984 Loader-IDB.exe 78 PID 3836 wrote to memory of 4080 3836 regasm.exe 84 PID 3836 wrote to memory of 4080 3836 regasm.exe 84 PID 3836 wrote to memory of 4080 3836 regasm.exe 84 PID 3836 wrote to memory of 1872 3836 regasm.exe 85 PID 3836 wrote to memory of 1872 3836 regasm.exe 85 PID 3836 wrote to memory of 1872 3836 regasm.exe 85 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 3836 wrote to memory of 3796 3836 regasm.exe 86 PID 2092 wrote to memory of 3452 2092 Loader-IDB.exe 94 PID 2092 wrote to memory of 3452 2092 Loader-IDB.exe 94 PID 2092 wrote to memory of 3452 2092 Loader-IDB.exe 94 PID 3452 wrote to memory of 1208 3452 Anyname.exe 95 PID 3452 wrote to memory of 1208 3452 Anyname.exe 95 PID 3452 wrote to memory of 1208 3452 Anyname.exe 95 PID 2092 wrote to memory of 3964 2092 Loader-IDB.exe 96 PID 2092 wrote to memory of 3964 2092 Loader-IDB.exe 96 PID 2092 wrote to memory of 3964 2092 Loader-IDB.exe 96 PID 2092 wrote to memory of 3964 2092 Loader-IDB.exe 96 PID 2092 wrote to memory of 3564 2092 Loader-IDB.exe 97 PID 2092 wrote to memory of 3564 2092 Loader-IDB.exe 97 PID 2092 wrote to memory of 3564 2092 Loader-IDB.exe 97 PID 2092 wrote to memory of 3564 2092 Loader-IDB.exe 97 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 628 3796 MSBuild.exe 98 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 1636 3796 MSBuild.exe 99 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 4012 3796 MSBuild.exe 101 PID 3796 wrote to memory of 1896 3796 MSBuild.exe 104 PID 3796 wrote to memory of 1896 3796 MSBuild.exe 104 PID 3796 wrote to memory of 1896 3796 MSBuild.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-d 56007 TCP4⤵
- Executes dropped EXE
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-a 10.10.0.38 56007 56007 TCP4⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-d 56008 TCP4⤵
- Executes dropped EXE
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\revpe.exe-a 10.10.0.38 56008 56008 TCP4⤵
- Executes dropped EXE
PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe-a 10.10.0.38 56008 56008 TCP4⤵
- Executes dropped EXE
PID:1896
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"1⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"1⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"C:\Users\Admin\AppData\Local\Temp\082263967\zmstage.exe"1⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"C:\Users\Admin\AppData\Local\Temp\Loader-IDB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\Patch.exePatch.exe /silent3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\TraceUninstall.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4036
-