Resubmissions
13/08/2021, 10:16
210813-wpta271jdx 1008/08/2021, 23:00
210808-fgs5g9pxfs 1007/08/2021, 23:12
210807-g2jw1lmd4a 1007/08/2021, 16:10
210807-51nhct4kfx 1006/08/2021, 23:43
210806-gc2271nxwj 1006/08/2021, 06:00
210806-f443x39x8a 1005/08/2021, 17:08
210805-97y6banvvx 1004/08/2021, 17:25
210804-hkxx2ntr8x 1004/08/2021, 12:12
210804-rjbg4b4y7n 1003/08/2021, 17:12
210803-r2h7ytjwqj 10Analysis
-
max time kernel
86s -
max time network
208s -
platform
windows11_x64 -
resource
win11 -
submitted
13/08/2021, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
8 (3).exe
Resource
win11
Behavioral task
behavioral2
Sample
8 (30).exe
Resource
win11
Behavioral task
behavioral3
Sample
8 (31).exe
Resource
win11
Errors
General
-
Target
8 (3).exe
-
Size
3.0MB
-
MD5
bb072cad921aa5ce8b97706ce01bc570
-
SHA1
18bf034906c1341b7817e7361ad27a4425d820bd
-
SHA256
817a50d00909383bbef41e6f4e61b527d55f0873bcf745b29dbba75f52fe2e97
-
SHA512
d40e5f77d882ed29bd9de5a6848072e2f81cd02176955e2b1a4aedcdf4eb687d77bebe33cef0c7d702bc828181755f86e2564523d476adbb785f396a5ce1d474
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral1/memory/2164-515-0x00000000015B0000-0x0000000001ED6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5348 4788 rUNdlL32.eXe 8 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral1/files/0x000100000002b20e-226.dat family_redline behavioral1/files/0x000100000002b20e-238.dat family_redline behavioral1/memory/4440-341-0x0000000007120000-0x0000000007152000-memory.dmp family_redline behavioral1/memory/3932-407-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 11 IoCs
description pid Process procid_target PID 4604 created 572 4604 WerFault.exe 81 PID 5244 created 4924 5244 WerFault.exe 92 PID 5288 created 3116 5288 WerFault.exe 93 PID 5404 created 5368 5404 WerFault.exe 110 PID 5984 created 5752 5984 WerFault.exe 115 PID 5232 created 6104 5232 WerFault.exe 124 PID 5312 created 1780 5312 WerFault.exe 179 PID 1080 created 2164 1080 WerFault.exe 155 PID 6020 created 5400 6020 WerFault.exe 132 PID 5968 created 5384 5968 WerFault.exe 134 PID 5564 created 948 5564 WerFault.exe 139 -
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 1 IoCs
resource yara_rule behavioral1/memory/5632-345-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft -
Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/4924-204-0x0000000000B90000-0x0000000000C2D000-memory.dmp family_vidar behavioral1/memory/5752-243-0x0000000004880000-0x000000000491D000-memory.dmp family_vidar behavioral1/memory/1780-406-0x00000000049A0000-0x0000000004A3D000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x000100000002b1d0-150.dat aspack_v212_v242 behavioral1/files/0x000100000002b1d0-152.dat aspack_v212_v242 behavioral1/files/0x000100000002b1cb-155.dat aspack_v212_v242 behavioral1/files/0x000100000002b1cb-157.dat aspack_v212_v242 behavioral1/files/0x000100000002b1ce-162.dat aspack_v212_v242 behavioral1/files/0x000100000002b1ce-161.dat aspack_v212_v242 behavioral1/files/0x000100000002b1cc-158.dat aspack_v212_v242 behavioral1/files/0x000100000002b1cc-154.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4952 setup_installer.exe 572 setup_install.exe 4924 sonia_3.exe 4904 sonia_1.exe 3116 sonia_2.exe 772 sonia_6.exe 4736 sonia_4.exe 3824 sonia_5.exe 3472 sonia_1.exe 5192 jfiag3g_gg.exe 5728 9euI9Lu3UBMqFnhjQtXIU_y0.exe 5740 58wjr4PU89QYrNHU_4CgnrYq.exe 5752 T8xDAZMgqa3KJVG0JU7sPHTh.exe 5764 _f2sJ5S2ZhEnlM42EeHXplIV.exe 5776 4UdLc_mFcwqveMWoPB9bFRnK.exe 5788 x7FTjuwTomibB8p06AVC8eBD.exe 5812 bDqRzXdCTpLzYyoSz_dPvBT8.exe 6104 1S1NA2Zmby7lsGyRexfuLYjt.exe 6048 x7FTjuwTomibB8p06AVC8eBD.exe 6128 oarWi7uU2p8LHM4_EpbluQY3.exe 5244 jfiag3g_gg.exe 4444 lpWtbKjTpenAEX7sBF1KmRKX.exe 5400 3568807.exe 5504 8114088.exe 5384 8698367.exe 5396 lpWtbKjTpenAEX7sBF1KmRKX.tmp 3620 4519590.exe 4440 6944905.exe 948 4659369.exe 5632 11111.exe 5296 1y4i0Jd1zp8RtYtRq5IpF02m.exe 5560 WinHoster.exe 704 Setup.exe 1124 11111.exe 1168 22222.exe 708 22222.exe 1780 powershell.exe 5600 Zl14TiIC4mbFtvvG3BKhBfTz.exe 1892 PXGFEvetfo20YxRHZwiGOgov.exe 2164 HIlirLkDZaRA_zLJsSxMganh.exe 5268 2ueQSyqopXXNYf8KFCG65Gh4.exe 3932 58wjr4PU89QYrNHU_4CgnrYq.exe 6124 customer3.exe 3492 GameBox.exe 2960 md8_8eus.exe 5236 GameBox32Bit.exe 3276 jooyu.exe 5472 BotCheck.exe 1452 11111.exe 5320 11111.exe 4460 WerFault.exe 4452 jfiag3g_gg.exe 5424 11111.exe 5624 6792303.exe 5568 jfiag3g_gg.exe 4568 1750317.exe 5308 11111.exe 6024 11111.exe 5068 11111.exe 4056 11111.exe 5564 WerFault.exe 1452 11111.exe 1888 jfiag3g_gg.exe 3064 jfiag3g_gg.exe -
resource yara_rule behavioral1/files/0x000100000002b1ea-203.dat upx behavioral1/files/0x000100000002b1ea-202.dat upx behavioral1/files/0x000100000002b225-263.dat upx behavioral1/files/0x000100000002b225-262.dat upx -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PXGFEvetfo20YxRHZwiGOgov.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PXGFEvetfo20YxRHZwiGOgov.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4UdLc_mFcwqveMWoPB9bFRnK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4UdLc_mFcwqveMWoPB9bFRnK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Zl14TiIC4mbFtvvG3BKhBfTz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Zl14TiIC4mbFtvvG3BKhBfTz.exe -
Loads dropped DLL 10 IoCs
pid Process 572 setup_install.exe 572 setup_install.exe 572 setup_install.exe 572 setup_install.exe 572 setup_install.exe 5368 rundll32.exe 5396 lpWtbKjTpenAEX7sBF1KmRKX.tmp 5396 lpWtbKjTpenAEX7sBF1KmRKX.tmp 5296 1y4i0Jd1zp8RtYtRq5IpF02m.exe 5296 1y4i0Jd1zp8RtYtRq5IpF02m.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000100000002b20e-226.dat themida behavioral1/files/0x000100000002b20e-238.dat themida behavioral1/memory/5776-272-0x00000000007C0000-0x00000000007C1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" sonia_6.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 8114088.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4UdLc_mFcwqveMWoPB9bFRnK.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Zl14TiIC4mbFtvvG3BKhBfTz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PXGFEvetfo20YxRHZwiGOgov.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.db-ip.com 69 ipinfo.io 2 ipinfo.io 2 ip-api.com 2 api.db-ip.com 13 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 5776 4UdLc_mFcwqveMWoPB9bFRnK.exe 5600 Zl14TiIC4mbFtvvG3BKhBfTz.exe 1892 PXGFEvetfo20YxRHZwiGOgov.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5788 set thread context of 6048 5788 x7FTjuwTomibB8p06AVC8eBD.exe 123 PID 5740 set thread context of 3932 5740 58wjr4PU89QYrNHU_4CgnrYq.exe 158 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libtta_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libexport_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\speaker-32.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsmf_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libhotkeys_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Folder-48.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libpva_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\liblogo_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\data_load.exe 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.json 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemuxdump_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libgestures_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\stream_window.html 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.xml 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\browse_window.html 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\connection.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\bbc_co_uk.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vimeo.luac 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsvorepository_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libgme_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegvideo_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\lua\liblua_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\d3d11\libdirect3d11_filters_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsubtitle_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_vc1_plugin.dll 1y4i0Jd1zp8RtYtRq5IpF02m.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css 1y4i0Jd1zp8RtYtRq5IpF02m.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 2964 572 WerFault.exe 81 5264 4924 WerFault.exe 92 5308 3116 WerFault.exe 93 5428 5368 WerFault.exe 110 3896 5752 WerFault.exe 115 5008 6104 WerFault.exe 124 2948 1780 WerFault.exe 150 4460 2164 WerFault.exe 155 5816 5400 WerFault.exe 132 5184 5384 WerFault.exe 134 5004 948 WerFault.exe 139 5460 5624 WerFault.exe 173 2856 3388 WerFault.exe 213 2816 5144 WerFault.exe 218 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x7FTjuwTomibB8p06AVC8eBD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x7FTjuwTomibB8p06AVC8eBD.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x7FTjuwTomibB8p06AVC8eBD.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MoNotificationUx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MoNotificationUx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MoNotificationUx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Enumerates system info in registry 2 TTPs 22 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 68 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 70 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 WerFault.exe 2964 WerFault.exe 5264 WerFault.exe 5264 WerFault.exe 5308 WerFault.exe 5308 WerFault.exe 5428 WerFault.exe 5428 WerFault.exe 6048 x7FTjuwTomibB8p06AVC8eBD.exe 6048 x7FTjuwTomibB8p06AVC8eBD.exe 5244 jfiag3g_gg.exe 5244 jfiag3g_gg.exe 5008 WerFault.exe 5008 WerFault.exe 3896 WerFault.exe 3896 WerFault.exe 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3100 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 6048 x7FTjuwTomibB8p06AVC8eBD.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 4512 svchost.exe Token: SeDebugPrivilege 4736 sonia_4.exe Token: SeRestorePrivilege 2964 WerFault.exe Token: SeBackupPrivilege 2964 WerFault.exe Token: SeBackupPrivilege 2964 WerFault.exe Token: SeDebugPrivilege 5812 bDqRzXdCTpLzYyoSz_dPvBT8.exe Token: SeDebugPrivilege 6128 oarWi7uU2p8LHM4_EpbluQY3.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 5400 3568807.exe Token: SeDebugPrivilege 5776 4UdLc_mFcwqveMWoPB9bFRnK.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 948 4659369.exe Token: SeDebugPrivilege 5384 8698367.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 4440 6944905.exe Token: SeDebugPrivilege 5740 58wjr4PU89QYrNHU_4CgnrYq.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 3620 4519590.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 5268 2ueQSyqopXXNYf8KFCG65Gh4.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 3932 58wjr4PU89QYrNHU_4CgnrYq.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 5600 Zl14TiIC4mbFtvvG3BKhBfTz.exe Token: SeDebugPrivilege 1892 PXGFEvetfo20YxRHZwiGOgov.exe Token: SeDebugPrivilege 5624 6792303.exe Token: SeShutdownPrivilege 3100 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 5396 lpWtbKjTpenAEX7sBF1KmRKX.tmp 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 2208 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 4952 4548 8 (3).exe 80 PID 4548 wrote to memory of 4952 4548 8 (3).exe 80 PID 4548 wrote to memory of 4952 4548 8 (3).exe 80 PID 4952 wrote to memory of 572 4952 setup_installer.exe 81 PID 4952 wrote to memory of 572 4952 setup_installer.exe 81 PID 4952 wrote to memory of 572 4952 setup_installer.exe 81 PID 5048 wrote to memory of 4344 5048 svchost.exe 84 PID 5048 wrote to memory of 4344 5048 svchost.exe 84 PID 572 wrote to memory of 4452 572 setup_install.exe 86 PID 572 wrote to memory of 4452 572 setup_install.exe 86 PID 572 wrote to memory of 4452 572 setup_install.exe 86 PID 572 wrote to memory of 4464 572 setup_install.exe 87 PID 572 wrote to memory of 4464 572 setup_install.exe 87 PID 572 wrote to memory of 4464 572 setup_install.exe 87 PID 572 wrote to memory of 4444 572 setup_install.exe 96 PID 572 wrote to memory of 4444 572 setup_install.exe 96 PID 572 wrote to memory of 4444 572 setup_install.exe 96 PID 572 wrote to memory of 4796 572 setup_install.exe 88 PID 572 wrote to memory of 4796 572 setup_install.exe 88 PID 572 wrote to memory of 4796 572 setup_install.exe 88 PID 572 wrote to memory of 4656 572 setup_install.exe 89 PID 572 wrote to memory of 4656 572 setup_install.exe 89 PID 572 wrote to memory of 4656 572 setup_install.exe 89 PID 572 wrote to memory of 4112 572 setup_install.exe 91 PID 572 wrote to memory of 4112 572 setup_install.exe 91 PID 572 wrote to memory of 4112 572 setup_install.exe 91 PID 572 wrote to memory of 4984 572 setup_install.exe 90 PID 572 wrote to memory of 4984 572 setup_install.exe 90 PID 572 wrote to memory of 4984 572 setup_install.exe 90 PID 4444 wrote to memory of 4924 4444 cmd.exe 92 PID 4444 wrote to memory of 4924 4444 cmd.exe 92 PID 4444 wrote to memory of 4924 4444 cmd.exe 92 PID 4452 wrote to memory of 4904 4452 cmd.exe 95 PID 4452 wrote to memory of 4904 4452 cmd.exe 95 PID 4452 wrote to memory of 4904 4452 cmd.exe 95 PID 4464 wrote to memory of 3116 4464 cmd.exe 93 PID 4464 wrote to memory of 3116 4464 cmd.exe 93 PID 4464 wrote to memory of 3116 4464 cmd.exe 93 PID 4112 wrote to memory of 772 4112 cmd.exe 100 PID 4112 wrote to memory of 772 4112 cmd.exe 100 PID 4112 wrote to memory of 772 4112 cmd.exe 100 PID 4796 wrote to memory of 4736 4796 cmd.exe 98 PID 4796 wrote to memory of 4736 4796 cmd.exe 98 PID 4656 wrote to memory of 3824 4656 cmd.exe 97 PID 4656 wrote to memory of 3824 4656 cmd.exe 97 PID 4656 wrote to memory of 3824 4656 cmd.exe 97 PID 4604 wrote to memory of 572 4604 WerFault.exe 81 PID 4604 wrote to memory of 572 4604 WerFault.exe 81 PID 4904 wrote to memory of 3472 4904 sonia_1.exe 102 PID 4904 wrote to memory of 3472 4904 sonia_1.exe 102 PID 4904 wrote to memory of 3472 4904 sonia_1.exe 102 PID 772 wrote to memory of 5192 772 sonia_6.exe 104 PID 772 wrote to memory of 5192 772 sonia_6.exe 104 PID 772 wrote to memory of 5192 772 sonia_6.exe 104 PID 5244 wrote to memory of 4924 5244 WerFault.exe 92 PID 5244 wrote to memory of 4924 5244 WerFault.exe 92 PID 5288 wrote to memory of 3116 5288 WerFault.exe 93 PID 5288 wrote to memory of 3116 5288 WerFault.exe 93 PID 5348 wrote to memory of 5368 5348 rUNdlL32.eXe 110 PID 5348 wrote to memory of 5368 5348 rUNdlL32.eXe 110 PID 5348 wrote to memory of 5368 5348 rUNdlL32.eXe 110 PID 5404 wrote to memory of 5368 5404 WerFault.exe 110 PID 5404 wrote to memory of 5368 5404 WerFault.exe 110 PID 3824 wrote to memory of 5728 3824 sonia_5.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\8 (3).exe"C:\Users\Admin\AppData\Local\Temp\8 (3).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_1.exesonia_1.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_1.exe" -a6⤵
- Executes dropped EXE
PID:3472
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_2.exesonia_2.exe5⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 2446⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_4.exesonia_4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_5.exesonia_5.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\Documents\_f2sJ5S2ZhEnlM42EeHXplIV.exe"C:\Users\Admin\Documents\_f2sJ5S2ZhEnlM42EeHXplIV.exe"6⤵
- Executes dropped EXE
PID:5764
-
-
C:\Users\Admin\Documents\T8xDAZMgqa3KJVG0JU7sPHTh.exe"C:\Users\Admin\Documents\T8xDAZMgqa3KJVG0JU7sPHTh.exe"6⤵
- Executes dropped EXE
PID:5752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
-
C:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exe"C:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5740 -
C:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exeC:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exe7⤵PID:5104
-
-
C:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exeC:\Users\Admin\Documents\58wjr4PU89QYrNHU_4CgnrYq.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Users\Admin\Documents\9euI9Lu3UBMqFnhjQtXIU_y0.exe"C:\Users\Admin\Documents\9euI9Lu3UBMqFnhjQtXIU_y0.exe"6⤵
- Executes dropped EXE
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
- Executes dropped EXE
PID:5424
-
-
-
C:\Users\Admin\Documents\bDqRzXdCTpLzYyoSz_dPvBT8.exe"C:\Users\Admin\Documents\bDqRzXdCTpLzYyoSz_dPvBT8.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5812 -
C:\Users\Admin\AppData\Roaming\3568807.exe"C:\Users\Admin\AppData\Roaming\3568807.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5400 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5400 -s 23928⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5816
-
-
-
C:\Users\Admin\AppData\Roaming\8114088.exe"C:\Users\Admin\AppData\Roaming\8114088.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5504 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵
- Executes dropped EXE
PID:5560
-
-
-
C:\Users\Admin\AppData\Roaming\4519590.exe"C:\Users\Admin\AppData\Roaming\4519590.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Users\Admin\AppData\Roaming\4659369.exe"C:\Users\Admin\AppData\Roaming\4659369.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 25568⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5004
-
-
-
-
C:\Users\Admin\Documents\x7FTjuwTomibB8p06AVC8eBD.exe"C:\Users\Admin\Documents\x7FTjuwTomibB8p06AVC8eBD.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5788 -
C:\Users\Admin\Documents\x7FTjuwTomibB8p06AVC8eBD.exe"C:\Users\Admin\Documents\x7FTjuwTomibB8p06AVC8eBD.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:6048
-
-
-
C:\Users\Admin\Documents\4UdLc_mFcwqveMWoPB9bFRnK.exe"C:\Users\Admin\Documents\4UdLc_mFcwqveMWoPB9bFRnK.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:5776
-
-
C:\Users\Admin\Documents\1S1NA2Zmby7lsGyRexfuLYjt.exe"C:\Users\Admin\Documents\1S1NA2Zmby7lsGyRexfuLYjt.exe"6⤵
- Executes dropped EXE
PID:6104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
-
C:\Users\Admin\Documents\oarWi7uU2p8LHM4_EpbluQY3.exe"C:\Users\Admin\Documents\oarWi7uU2p8LHM4_EpbluQY3.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6128 -
C:\Users\Admin\AppData\Roaming\8698367.exe"C:\Users\Admin\AppData\Roaming\8698367.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5384 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5384 -s 24008⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5184
-
-
-
C:\Users\Admin\AppData\Roaming\6944905.exe"C:\Users\Admin\AppData\Roaming\6944905.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
-
C:\Users\Admin\Documents\lpWtbKjTpenAEX7sBF1KmRKX.exe"C:\Users\Admin\Documents\lpWtbKjTpenAEX7sBF1KmRKX.exe"6⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\is-9UC12.tmp\lpWtbKjTpenAEX7sBF1KmRKX.tmp"C:\Users\Admin\AppData\Local\Temp\is-9UC12.tmp\lpWtbKjTpenAEX7sBF1KmRKX.tmp" /SL5="$601F6,138429,56832,C:\Users\Admin\Documents\lpWtbKjTpenAEX7sBF1KmRKX.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\is-P13D5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-P13D5.tmp\Setup.exe" /Verysilent8⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:704 -
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"9⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
PID:1888
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"9⤵
- Executes dropped EXE
PID:5472
-
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"9⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\note8876.exe"C:\Users\Admin\AppData\Local\Temp\note8876.exe" end10⤵PID:4460
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"9⤵
- Executes dropped EXE
PID:5236 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵
- Executes dropped EXE
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"10⤵
- Executes dropped EXE
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"10⤵
- Executes dropped EXE
PID:708
-
-
-
-
-
-
C:\Users\Admin\Documents\1y4i0Jd1zp8RtYtRq5IpF02m.exe"C:\Users\Admin\Documents\1y4i0Jd1zp8RtYtRq5IpF02m.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5F4E.tmp\tempfile.ps1"7⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5F4E.tmp\tempfile.ps1"7⤵PID:1428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5F4E.tmp\tempfile.ps1"7⤵PID:4160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5F4E.tmp\tempfile.ps1"7⤵PID:5188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5F4E.tmp\tempfile.ps1"7⤵PID:5944
-
-
-
C:\Users\Admin\Documents\8eRZDfO1sE_ncMOXd4643jpW.exe"C:\Users\Admin\Documents\8eRZDfO1sE_ncMOXd4643jpW.exe"6⤵PID:1168
-
-
C:\Users\Admin\Documents\PXGFEvetfo20YxRHZwiGOgov.exe"C:\Users\Admin\Documents\PXGFEvetfo20YxRHZwiGOgov.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Users\Admin\Documents\Zl14TiIC4mbFtvvG3BKhBfTz.exe"C:\Users\Admin\Documents\Zl14TiIC4mbFtvvG3BKhBfTz.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
C:\Users\Admin\Documents\gqDXzn0ASbKRe8FTudT66X2X.exe"C:\Users\Admin\Documents\gqDXzn0ASbKRe8FTudT66X2X.exe"6⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2948
-
-
-
C:\Users\Admin\Documents\ibxINZMiQpR5I32xCvPxH15J.exe"C:\Users\Admin\Documents\ibxINZMiQpR5I32xCvPxH15J.exe"6⤵PID:708
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"7⤵
- Executes dropped EXE
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"8⤵
- Executes dropped EXE
PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵
- Executes dropped EXE
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵
- Executes dropped EXE
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵PID:2416
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵
- Executes dropped EXE
PID:2960
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:3064
-
-
-
-
C:\Users\Admin\Documents\2ueQSyqopXXNYf8KFCG65Gh4.exe"C:\Users\Admin\Documents\2ueQSyqopXXNYf8KFCG65Gh4.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5268 -
C:\Users\Admin\AppData\Roaming\6792303.exe"C:\Users\Admin\AppData\Roaming\6792303.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5624 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5624 -s 22608⤵
- Program crash
PID:5460
-
-
-
C:\Users\Admin\AppData\Roaming\1750317.exe"C:\Users\Admin\AppData\Roaming\1750317.exe"7⤵
- Executes dropped EXE
PID:4568
-
-
-
C:\Users\Admin\Documents\HIlirLkDZaRA_zLJsSxMganh.exe"C:\Users\Admin\Documents\HIlirLkDZaRA_zLJsSxMganh.exe"6⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2407⤵
- Executes dropped EXE
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4460
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵PID:4984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_6.exesonia_6.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5244
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 4964⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\System32\pcaui.exeC:\Windows\System32\pcaui.exe -n 0 -a "" -v "" -g "" -x ""2⤵PID:4344
-
-
C:\Windows\system32\MoNotificationUx.exe%systemroot%\system32\MoNotificationUx.exe /ClearActiveNotifications1⤵
- Checks processor information in registry
PID:5044
-
C:\Users\Admin\AppData\Local\Temp\7zS853F72A3\sonia_3.exesonia_3.exe1⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 2442⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 572 -ip 5721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4924 -ip 49241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:5244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3116 -ip 31161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:5288
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:5368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5368 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5368 -ip 53681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:5404
-
C:\Windows\system32\MoNotificationUx.exe%systemroot%\system32\MoNotificationUx.exe /ClearActiveNotifications1⤵
- Checks processor information in registry
PID:5488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5752 -ip 57521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5984
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv R3q930x020WnyfI9gsy3Ow.0.21⤵
- Modifies data under HKEY_USERS
PID:6036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 6104 -ip 61041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1780 -ip 17801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5312
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:6136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2164 -ip 21641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1080
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 492 -p 5400 -ip 54001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6020
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 568 -p 5384 -ip 53841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 948 -ip 9481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5564
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 5624 -ip 56241⤵PID:4336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\372E.exeC:\Users\Admin\AppData\Local\Temp\372E.exe1⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3B55.exeC:\Users\Admin\AppData\Local\Temp\3B55.exe1⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 2762⤵
- Program crash
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3388 -ip 33881⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\4096.exeC:\Users\Admin\AppData\Local\Temp\4096.exe1⤵PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5144 -s 2362⤵
- Program crash
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\4385.exeC:\Users\Admin\AppData\Local\Temp\4385.exe1⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5144 -ip 51441⤵PID:5468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:5044
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2d055 /state1:0x41c64e6d1⤵PID:4848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc1⤵PID:1796