Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
1Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
113s -
max time network
1354s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-08-2021 07:49
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (12).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
Second_7.5K
45.14.49.200:27625
Extracted
redline
www
185.204.109.146:54891
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
metasploit
windows/single_exec
Extracted
redline
205.185.119.191:18846
Extracted
redline
20_8_rs
jekorikani.xyz:80
Extracted
redline
dibild
135.148.139.222:33569
Extracted
redline
19.08
95.181.172.100:6795
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral7/memory/2060-153-0x00000000044E0000-0x0000000004E06000-memory.dmp family_glupteba behavioral7/memory/2060-162-0x0000000000400000-0x00000000027DB000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 17 IoCs
resource yara_rule behavioral7/files/0x000300000001312d-62.dat family_redline behavioral7/files/0x000300000001312d-64.dat family_redline behavioral7/files/0x0003000000013153-74.dat family_redline behavioral7/files/0x000300000001312d-91.dat family_redline behavioral7/files/0x0003000000013153-68.dat family_redline behavioral7/files/0x0003000000013153-113.dat family_redline behavioral7/memory/2240-209-0x0000000004520000-0x000000000453C000-memory.dmp family_redline behavioral7/memory/2240-239-0x00000000046C0000-0x00000000046DA000-memory.dmp family_redline behavioral7/memory/2536-249-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2320-256-0x0000000000418E52-mapping.dmp family_redline behavioral7/memory/2536-254-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2320-252-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2224-255-0x000000000041905A-mapping.dmp family_redline behavioral7/memory/2320-258-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2224-259-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2224-251-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral7/memory/2536-250-0x0000000000418F7A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral7/memory/2300-133-0x0000000000220000-0x00000000002BD000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 32 IoCs
pid Process 1368 XgrwGAQkMvsH2pQxMy14F46a.exe 1364 DihZnmYfLyP_HNnei3NRBCWq.exe 1620 LXsjF1wgGVohCNI4DBrmDkl0.exe 2040 jcBKuIOkCNzQDgEqD89VNp3s.exe 1560 d7xafN1c_AQtnjYJccHAoeXv.exe 1220 Uh0Lf_YAHWwfaGI0dZlJzpCU.exe 976 kY29YA7v9pd7ajF5Dch6UGYM.exe 1616 ry_BucaqOZdGksVtt1c68WK9.exe 1064 3XrOzRySz0P1pHI0bML8YyKk.exe 2088 7sGbCBbXZckpgCuDuH6V7F2I.exe 2060 RXbS9Cvu3iO8h1DLEYPj1I_F.exe 2224 d7xafN1c_AQtnjYJccHAoeXv.exe 2240 QBk6SsWhOD_HArGogTz433eS.exe 2300 vyAs9ZLPJonkN0BjgfAMmqwF.exe 2320 jcBKuIOkCNzQDgEqD89VNp3s.exe 2384 PSVXcmxDRsAtSqUpBp52BE74.exe 2456 1GtwcuX_pLCRovKswQ6KGJCw.exe 2412 _wCh0_pk12twdESVfAzeVdRH.exe 2432 0NCzzXRSUvN_vgt1iTCuMYZ4.exe 2404 0EFsImdCwwhWEnQxPLFMyAnl.exe 2584 RfHrWOKTOAktpdx4bw2mlb1Q.exe 2632 1GtwcuX_pLCRovKswQ6KGJCw.tmp 2652 2460299.exe 2716 1935926.exe 2148 jooyu.exe 2160 md8_8eus.exe 1528 customer3.exe 1172 jfiag3g_gg.exe 2504 WinHoster.exe 2536 Uh0Lf_YAHWwfaGI0dZlJzpCU.exe 2224 d7xafN1c_AQtnjYJccHAoeXv.exe 2320 jcBKuIOkCNzQDgEqD89VNp3s.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ry_BucaqOZdGksVtt1c68WK9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ry_BucaqOZdGksVtt1c68WK9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion _wCh0_pk12twdESVfAzeVdRH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion _wCh0_pk12twdESVfAzeVdRH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7sGbCBbXZckpgCuDuH6V7F2I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7sGbCBbXZckpgCuDuH6V7F2I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3XrOzRySz0P1pHI0bML8YyKk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3XrOzRySz0P1pHI0bML8YyKk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation Setup (12).exe -
Loads dropped DLL 39 IoCs
pid Process 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 1048 Setup (12).exe 2456 1GtwcuX_pLCRovKswQ6KGJCw.exe 2632 1GtwcuX_pLCRovKswQ6KGJCw.tmp 2632 1GtwcuX_pLCRovKswQ6KGJCw.tmp 2632 1GtwcuX_pLCRovKswQ6KGJCw.tmp 2404 0EFsImdCwwhWEnQxPLFMyAnl.exe 2404 0EFsImdCwwhWEnQxPLFMyAnl.exe 2404 0EFsImdCwwhWEnQxPLFMyAnl.exe 2148 jooyu.exe 2148 jooyu.exe 2716 1935926.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1608 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral7/files/0x0003000000013157-92.dat themida behavioral7/files/0x000300000001315a-95.dat themida behavioral7/files/0x000300000001315a-97.dat themida behavioral7/files/0x0003000000013157-94.dat themida behavioral7/files/0x0003000000013159-105.dat themida behavioral7/files/0x0003000000013159-103.dat themida behavioral7/files/0x0003000000013185-151.dat themida behavioral7/files/0x0003000000013185-139.dat themida behavioral7/memory/1616-192-0x0000000001310000-0x0000000001311000-memory.dmp themida behavioral7/memory/1064-193-0x0000000001170000-0x0000000001171000-memory.dmp themida behavioral7/memory/2088-189-0x0000000000FD0000-0x0000000000FD1000-memory.dmp themida behavioral7/memory/2412-202-0x00000000008B0000-0x00000000008B1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1935926.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA _wCh0_pk12twdESVfAzeVdRH.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3XrOzRySz0P1pHI0bML8YyKk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7sGbCBbXZckpgCuDuH6V7F2I.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ry_BucaqOZdGksVtt1c68WK9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 19 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 138 ip-api.com 315 ipinfo.io 369 api.2ip.ua 394 ipinfo.io 416 ipinfo.io 21 ipinfo.io 412 ipinfo.io 417 api.2ip.ua 135 ipinfo.io 202 ipinfo.io 221 ipinfo.io 137 ipinfo.io 208 ipinfo.io 220 ipinfo.io 308 ipinfo.io 370 api.2ip.ua 392 ipinfo.io 486 ipinfo.io 22 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1616 ry_BucaqOZdGksVtt1c68WK9.exe 1064 3XrOzRySz0P1pHI0bML8YyKk.exe 2088 7sGbCBbXZckpgCuDuH6V7F2I.exe 2412 _wCh0_pk12twdESVfAzeVdRH.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1220 set thread context of 2536 1220 Uh0Lf_YAHWwfaGI0dZlJzpCU.exe 82 PID 1560 set thread context of 2224 1560 kj98jDGFJ5.exe 81 PID 2040 set thread context of 2320 2040 jcBKuIOkCNzQDgEqD89VNp3s.exe 80 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 0EFsImdCwwhWEnQxPLFMyAnl.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe 0EFsImdCwwhWEnQxPLFMyAnl.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 0EFsImdCwwhWEnQxPLFMyAnl.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe 0EFsImdCwwhWEnQxPLFMyAnl.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 0EFsImdCwwhWEnQxPLFMyAnl.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3388 2820 WerFault.exe 93 2768 2652 WerFault.exe 66 904 560 WerFault.exe 87 3936 2300 WerFault.exe 55 4640 1628 WerFault.exe 183 2936 3780 WerFault.exe 129 4964 2076 WerFault.exe 154 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kY29YA7v9pd7ajF5Dch6UGYM.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kY29YA7v9pd7ajF5Dch6UGYM.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kY29YA7v9pd7ajF5Dch6UGYM.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4576 schtasks.exe 4332 schtasks.exe 3132 schtasks.exe 2064 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 672 timeout.exe 1880 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 2268 taskkill.exe 952 taskkill.exe 4596 taskkill.exe 2668 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (12).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Setup (12).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Setup (12).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (12).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 1GtwcuX_pLCRovKswQ6KGJCw.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802025300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c00b000000010000001600000047006c006f00620061006c005300690067006e000000140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 1GtwcuX_pLCRovKswQ6KGJCw.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Setup (12).exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3876 PING.EXE -
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 137 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 207 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 420 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 487 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 143 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 312 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 393 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 414 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1048 Setup (12).exe 976 kY29YA7v9pd7ajF5Dch6UGYM.exe 976 kY29YA7v9pd7ajF5Dch6UGYM.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 976 kY29YA7v9pd7ajF5Dch6UGYM.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1364 DihZnmYfLyP_HNnei3NRBCWq.exe Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeDebugPrivilege 2268 taskkill.exe Token: SeDebugPrivilege 952 taskkill.exe Token: SeShutdownPrivilege 1208 Process not Found Token: SeShutdownPrivilege 1208 Process not Found Token: SeDebugPrivilege 2652 2460299.exe Token: SeDebugPrivilege 2536 Uh0Lf_YAHWwfaGI0dZlJzpCU.exe Token: SeDebugPrivilege 1616 ry_BucaqOZdGksVtt1c68WK9.exe Token: SeDebugPrivilege 1064 3XrOzRySz0P1pHI0bML8YyKk.exe Token: SeDebugPrivilege 1620 LXsjF1wgGVohCNI4DBrmDkl0.exe Token: SeDebugPrivilege 2240 QBk6SsWhOD_HArGogTz433eS.exe Token: SeDebugPrivilege 2320 jcBKuIOkCNzQDgEqD89VNp3s.exe Token: SeDebugPrivilege 2088 7sGbCBbXZckpgCuDuH6V7F2I.exe Token: SeDebugPrivilege 1368 XgrwGAQkMvsH2pQxMy14F46a.exe Token: SeDebugPrivilege 2412 _wCh0_pk12twdESVfAzeVdRH.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2632 1GtwcuX_pLCRovKswQ6KGJCw.tmp 1208 Process not Found 1208 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1368 1048 Setup (12).exe 31 PID 1048 wrote to memory of 1368 1048 Setup (12).exe 31 PID 1048 wrote to memory of 1368 1048 Setup (12).exe 31 PID 1048 wrote to memory of 1368 1048 Setup (12).exe 31 PID 1048 wrote to memory of 1364 1048 Setup (12).exe 33 PID 1048 wrote to memory of 1364 1048 Setup (12).exe 33 PID 1048 wrote to memory of 1364 1048 Setup (12).exe 33 PID 1048 wrote to memory of 1364 1048 Setup (12).exe 33 PID 1048 wrote to memory of 1620 1048 Setup (12).exe 35 PID 1048 wrote to memory of 1620 1048 Setup (12).exe 35 PID 1048 wrote to memory of 1620 1048 Setup (12).exe 35 PID 1048 wrote to memory of 1620 1048 Setup (12).exe 35 PID 1048 wrote to memory of 2040 1048 Setup (12).exe 34 PID 1048 wrote to memory of 2040 1048 Setup (12).exe 34 PID 1048 wrote to memory of 2040 1048 Setup (12).exe 34 PID 1048 wrote to memory of 2040 1048 Setup (12).exe 34 PID 1048 wrote to memory of 1220 1048 Setup (12).exe 48 PID 1048 wrote to memory of 1220 1048 Setup (12).exe 48 PID 1048 wrote to memory of 1220 1048 Setup (12).exe 48 PID 1048 wrote to memory of 1220 1048 Setup (12).exe 48 PID 1048 wrote to memory of 1560 1048 Setup (12).exe 46 PID 1048 wrote to memory of 1560 1048 Setup (12).exe 46 PID 1048 wrote to memory of 1560 1048 Setup (12).exe 46 PID 1048 wrote to memory of 1560 1048 Setup (12).exe 46 PID 1048 wrote to memory of 976 1048 Setup (12).exe 38 PID 1048 wrote to memory of 976 1048 Setup (12).exe 38 PID 1048 wrote to memory of 976 1048 Setup (12).exe 38 PID 1048 wrote to memory of 976 1048 Setup (12).exe 38 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1616 1048 Setup (12).exe 41 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 1064 1048 Setup (12).exe 45 PID 1048 wrote to memory of 2060 1048 Setup (12).exe 43 PID 1048 wrote to memory of 2060 1048 Setup (12).exe 43 PID 1048 wrote to memory of 2060 1048 Setup (12).exe 43 PID 1048 wrote to memory of 2060 1048 Setup (12).exe 43 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2088 1048 Setup (12).exe 49 PID 1048 wrote to memory of 2224 1048 Setup (12).exe 81 PID 1048 wrote to memory of 2224 1048 Setup (12).exe 81 PID 1048 wrote to memory of 2224 1048 Setup (12).exe 81 PID 1048 wrote to memory of 2224 1048 Setup (12).exe 81 PID 1048 wrote to memory of 2240 1048 Setup (12).exe 51 PID 1048 wrote to memory of 2240 1048 Setup (12).exe 51 PID 1048 wrote to memory of 2240 1048 Setup (12).exe 51 PID 1048 wrote to memory of 2240 1048 Setup (12).exe 51 PID 1048 wrote to memory of 2300 1048 Setup (12).exe 55 PID 1048 wrote to memory of 2300 1048 Setup (12).exe 55 PID 1048 wrote to memory of 2300 1048 Setup (12).exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (12).exe"C:\Users\Admin\AppData\Local\Temp\Setup (12).exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\Documents\XgrwGAQkMvsH2pQxMy14F46a.exe"C:\Users\Admin\Documents\XgrwGAQkMvsH2pQxMy14F46a.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Users\Admin\Documents\DihZnmYfLyP_HNnei3NRBCWq.exe"C:\Users\Admin\Documents\DihZnmYfLyP_HNnei3NRBCWq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Users\Admin\AppData\Roaming\2460299.exe"C:\Users\Admin\AppData\Roaming\2460299.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 17084⤵
- Program crash
PID:2768
-
-
-
C:\Users\Admin\AppData\Roaming\1935926.exe"C:\Users\Admin\AppData\Roaming\1935926.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2716 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:2504
-
-
-
-
C:\Users\Admin\Documents\jcBKuIOkCNzQDgEqD89VNp3s.exe"C:\Users\Admin\Documents\jcBKuIOkCNzQDgEqD89VNp3s.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2040 -
C:\Users\Admin\Documents\jcBKuIOkCNzQDgEqD89VNp3s.exeC:\Users\Admin\Documents\jcBKuIOkCNzQDgEqD89VNp3s.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
-
C:\Users\Admin\Documents\LXsjF1wgGVohCNI4DBrmDkl0.exe"C:\Users\Admin\Documents\LXsjF1wgGVohCNI4DBrmDkl0.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\Documents\kY29YA7v9pd7ajF5Dch6UGYM.exe"C:\Users\Admin\Documents\kY29YA7v9pd7ajF5Dch6UGYM.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:976
-
-
C:\Users\Admin\Documents\ry_BucaqOZdGksVtt1c68WK9.exe"C:\Users\Admin\Documents\ry_BucaqOZdGksVtt1c68WK9.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\Documents\RXbS9Cvu3iO8h1DLEYPj1I_F.exe"C:\Users\Admin\Documents\RXbS9Cvu3iO8h1DLEYPj1I_F.exe"2⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\Documents\RXbS9Cvu3iO8h1DLEYPj1I_F.exe"C:\Users\Admin\Documents\RXbS9Cvu3iO8h1DLEYPj1I_F.exe"3⤵PID:4976
-
-
-
C:\Users\Admin\Documents\3XrOzRySz0P1pHI0bML8YyKk.exe"C:\Users\Admin\Documents\3XrOzRySz0P1pHI0bML8YyKk.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\Documents\d7xafN1c_AQtnjYJccHAoeXv.exe"C:\Users\Admin\Documents\d7xafN1c_AQtnjYJccHAoeXv.exe"2⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\Documents\d7xafN1c_AQtnjYJccHAoeXv.exeC:\Users\Admin\Documents\d7xafN1c_AQtnjYJccHAoeXv.exe3⤵
- Executes dropped EXE
PID:2224
-
-
-
C:\Users\Admin\Documents\Uh0Lf_YAHWwfaGI0dZlJzpCU.exe"C:\Users\Admin\Documents\Uh0Lf_YAHWwfaGI0dZlJzpCU.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1220 -
C:\Users\Admin\Documents\Uh0Lf_YAHWwfaGI0dZlJzpCU.exeC:\Users\Admin\Documents\Uh0Lf_YAHWwfaGI0dZlJzpCU.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
C:\Users\Admin\Documents\7sGbCBbXZckpgCuDuH6V7F2I.exe"C:\Users\Admin\Documents\7sGbCBbXZckpgCuDuH6V7F2I.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Users\Admin\Documents\QBk6SsWhOD_HArGogTz433eS.exe"C:\Users\Admin\Documents\QBk6SsWhOD_HArGogTz433eS.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\Documents\RfHrWOKTOAktpdx4bw2mlb1Q.exe"C:\Users\Admin\Documents\RfHrWOKTOAktpdx4bw2mlb1Q.exe"2⤵PID:2224
-
C:\Users\Admin\Documents\RfHrWOKTOAktpdx4bw2mlb1Q.exe"C:\Users\Admin\Documents\RfHrWOKTOAktpdx4bw2mlb1Q.exe" -q3⤵
- Executes dropped EXE
PID:2584
-
-
-
C:\Users\Admin\Documents\vyAs9ZLPJonkN0BjgfAMmqwF.exe"C:\Users\Admin\Documents\vyAs9ZLPJonkN0BjgfAMmqwF.exe"2⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 9043⤵
- Program crash
PID:3936
-
-
-
C:\Users\Admin\Documents\u70hjgDuFmVSczayDEq9Ko8P.exe"C:\Users\Admin\Documents\u70hjgDuFmVSczayDEq9Ko8P.exe"2⤵PID:2320
-
-
C:\Users\Admin\Documents\1GtwcuX_pLCRovKswQ6KGJCw.exe"C:\Users\Admin\Documents\1GtwcuX_pLCRovKswQ6KGJCw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\is-SHDPJ.tmp\1GtwcuX_pLCRovKswQ6KGJCw.tmp"C:\Users\Admin\AppData\Local\Temp\is-SHDPJ.tmp\1GtwcuX_pLCRovKswQ6KGJCw.tmp" /SL5="$10174,138429,56832,C:\Users\Admin\Documents\1GtwcuX_pLCRovKswQ6KGJCw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\is-CTFEP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-CTFEP.tmp\Setup.exe" /Verysilent4⤵PID:1904
-
C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"5⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 13606⤵
- Program crash
PID:904
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\is-UE6U0.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-UE6U0.tmp\Inlog.tmp" /SL5="$30172,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:2276
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵PID:2496
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629274550 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:1544
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\is-CRL1T.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-CRL1T.tmp\WEATHER Manager.tmp" /SL5="$201A2,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\is-13VG2.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-13VG2.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵PID:4868
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-13VG2.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-13VG2.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629274550 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:3804
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\is-TLCU3.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-TLCU3.tmp\VPN.tmp" /SL5="$20174,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵PID:2720
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"5⤵PID:2464
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 4686⤵
- Program crash
PID:3388
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:2096
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:2372
-
C:\Users\Admin\AppData\Roaming\8744229.exe"C:\Users\Admin\AppData\Roaming\8744229.exe"6⤵PID:3780
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3780 -s 8647⤵
- Program crash
PID:2936
-
-
-
C:\Users\Admin\AppData\Roaming\5875555.exe"C:\Users\Admin\AppData\Roaming\5875555.exe"6⤵PID:3608
-
-
C:\Users\Admin\AppData\Roaming\7014380.exe"C:\Users\Admin\AppData\Roaming\7014380.exe"6⤵PID:3720
-
-
C:\Users\Admin\AppData\Roaming\8217679.exe"C:\Users\Admin\AppData\Roaming\8217679.exe"6⤵PID:2068
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵PID:1672
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:3140
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"5⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\tmpAD50_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAD50_tmp.exe"6⤵PID:1716
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"7⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks7⤵PID:4876
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:1132
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks9⤵PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comEsplorarne.exe.com i9⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i10⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i11⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i12⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i13⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i14⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i15⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i16⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i17⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i18⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i19⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i20⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i21⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i22⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i23⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i24⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping MRBKYMNO -n 309⤵
- Runs ping.exe
PID:3876
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵PID:996
-
C:\Users\Admin\Documents\H67mRZuB3StT6Qh9pyDqufZG.exe"C:\Users\Admin\Documents\H67mRZuB3StT6Qh9pyDqufZG.exe"6⤵PID:1672
-
C:\Users\Admin\Documents\H67mRZuB3StT6Qh9pyDqufZG.exe"C:\Users\Admin\Documents\H67mRZuB3StT6Qh9pyDqufZG.exe"7⤵PID:2396
-
-
-
C:\Users\Admin\Documents\plt9xCly0sGk0sDDY_c3Gzpl.exe"C:\Users\Admin\Documents\plt9xCly0sGk0sDDY_c3Gzpl.exe"6⤵PID:3136
-
-
C:\Users\Admin\Documents\1_ZUn7vD3qN4IRBF1zQ54mCd.exe"C:\Users\Admin\Documents\1_ZUn7vD3qN4IRBF1zQ54mCd.exe"6⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1_ZUn7vD3qN4IRBF1zQ54mCd.exe" /f & erase "C:\Users\Admin\Documents\1_ZUn7vD3qN4IRBF1zQ54mCd.exe" & exit7⤵PID:2828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1_ZUn7vD3qN4IRBF1zQ54mCd.exe" /f8⤵
- Kills process with taskkill
PID:4596
-
-
-
-
C:\Users\Admin\Documents\7FqrMOEqCdaZeIXVikjt_NAr.exe"C:\Users\Admin\Documents\7FqrMOEqCdaZeIXVikjt_NAr.exe"6⤵PID:1312
-
-
C:\Users\Admin\Documents\aLsqARb7xrjg3H7os846WIfV.exe"C:\Users\Admin\Documents\aLsqARb7xrjg3H7os846WIfV.exe"6⤵PID:3208
-
-
C:\Users\Admin\Documents\4tZN3BFlzJFUeo5amgctqM9y.exe"C:\Users\Admin\Documents\4tZN3BFlzJFUeo5amgctqM9y.exe"6⤵PID:3236
-
-
C:\Users\Admin\Documents\uK9mZw1c67meGBHjrahRwc5o.exe"C:\Users\Admin\Documents\uK9mZw1c67meGBHjrahRwc5o.exe"6⤵PID:3200
-
-
C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe"C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe"6⤵PID:3168
-
C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exeC:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe7⤵PID:2528
-
-
C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exeC:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe7⤵PID:2004
-
-
C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exeC:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe7⤵PID:3776
-
-
C:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exeC:\Users\Admin\Documents\Ycy0bgQPqaTulOYA_icjm3tP.exe7⤵PID:2440
-
-
-
C:\Users\Admin\Documents\QWX2JeVWbPmWQfswk4s9lCsW.exe"C:\Users\Admin\Documents\QWX2JeVWbPmWQfswk4s9lCsW.exe"6⤵PID:3156
-
-
C:\Users\Admin\Documents\yiUil2w9NLtxS__546v8Rmd4.exe"C:\Users\Admin\Documents\yiUil2w9NLtxS__546v8Rmd4.exe"6⤵PID:3128
-
C:\Users\Admin\Documents\yiUil2w9NLtxS__546v8Rmd4.exe"C:\Users\Admin\Documents\yiUil2w9NLtxS__546v8Rmd4.exe" -q7⤵PID:1520
-
-
-
C:\Users\Admin\Documents\ODSakfnNT22XB2UO7Xl1gnxd.exe"C:\Users\Admin\Documents\ODSakfnNT22XB2UO7Xl1gnxd.exe"6⤵PID:3104
-
-
C:\Users\Admin\Documents\kgy28BY1dCz3Bdp38ubaeJ6Q.exe"C:\Users\Admin\Documents\kgy28BY1dCz3Bdp38ubaeJ6Q.exe"6⤵PID:3076
-
-
C:\Users\Admin\Documents\M2o757uoGqeY75nW_ubsTFTC.exe"C:\Users\Admin\Documents\M2o757uoGqeY75nW_ubsTFTC.exe"6⤵PID:4076
-
-
C:\Users\Admin\Documents\vEbsIWHisZtnc_DB1499SiAe.exe"C:\Users\Admin\Documents\vEbsIWHisZtnc_DB1499SiAe.exe"6⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im vEbsIWHisZtnc_DB1499SiAe.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\vEbsIWHisZtnc_DB1499SiAe.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4032
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vEbsIWHisZtnc_DB1499SiAe.exe /f8⤵
- Kills process with taskkill
PID:2668
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:672
-
-
-
-
C:\Users\Admin\Documents\9EVwIY8murLFMss4YtMN3E3V.exe"C:\Users\Admin\Documents\9EVwIY8murLFMss4YtMN3E3V.exe"6⤵PID:4060
-
C:\Users\Admin\Documents\9EVwIY8murLFMss4YtMN3E3V.exeC:\Users\Admin\Documents\9EVwIY8murLFMss4YtMN3E3V.exe7⤵PID:3676
-
-
-
C:\Users\Admin\Documents\RtU2Bjq4lu919suEVDGgx9l7.exe"C:\Users\Admin\Documents\RtU2Bjq4lu919suEVDGgx9l7.exe"6⤵PID:4016
-
-
C:\Users\Admin\Documents\CcLJEWM3IsWougeRZDd1kT0I.exe"C:\Users\Admin\Documents\CcLJEWM3IsWougeRZDd1kT0I.exe"6⤵PID:3996
-
C:\Users\Admin\Documents\CcLJEWM3IsWougeRZDd1kT0I.exeC:\Users\Admin\Documents\CcLJEWM3IsWougeRZDd1kT0I.exe7⤵PID:3708
-
-
-
C:\Users\Admin\Documents\YmtNTOtygF5ewLODX9dnaRwo.exe"C:\Users\Admin\Documents\YmtNTOtygF5ewLODX9dnaRwo.exe"6⤵PID:3984
-
C:\Users\Admin\AppData\Roaming\8424068.exe"C:\Users\Admin\AppData\Roaming\8424068.exe"7⤵PID:2076
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2076 -s 15928⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Roaming\2433618.exe"C:\Users\Admin\AppData\Roaming\2433618.exe"7⤵PID:2104
-
-
-
C:\Users\Admin\Documents\Fs7lqeQipqh6B6mJBmhsAMK6.exe"C:\Users\Admin\Documents\Fs7lqeQipqh6B6mJBmhsAMK6.exe"6⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\is-7LFG7.tmp\Fs7lqeQipqh6B6mJBmhsAMK6.tmp"C:\Users\Admin\AppData\Local\Temp\is-7LFG7.tmp\Fs7lqeQipqh6B6mJBmhsAMK6.tmp" /SL5="$30190,138429,56832,C:\Users\Admin\Documents\Fs7lqeQipqh6B6mJBmhsAMK6.exe"7⤵PID:1824
-
-
-
-
-
-
-
C:\Users\Admin\Documents\0NCzzXRSUvN_vgt1iTCuMYZ4.exe"C:\Users\Admin\Documents\0NCzzXRSUvN_vgt1iTCuMYZ4.exe"2⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "0NCzzXRSUvN_vgt1iTCuMYZ4.exe" /f & erase "C:\Users\Admin\Documents\0NCzzXRSUvN_vgt1iTCuMYZ4.exe" & exit3⤵PID:3064
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "0NCzzXRSUvN_vgt1iTCuMYZ4.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
-
C:\Users\Admin\Documents\_wCh0_pk12twdESVfAzeVdRH.exe"C:\Users\Admin\Documents\_wCh0_pk12twdESVfAzeVdRH.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Users\Admin\Documents\0EFsImdCwwhWEnQxPLFMyAnl.exe"C:\Users\Admin\Documents\0EFsImdCwwhWEnQxPLFMyAnl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2404 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:2160
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:1528
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4696
-
-
-
-
C:\Users\Admin\Documents\PSVXcmxDRsAtSqUpBp52BE74.exe"C:\Users\Admin\Documents\PSVXcmxDRsAtSqUpBp52BE74.exe"2⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "PSVXcmxDRsAtSqUpBp52BE74.exe" /f & erase "C:\Users\Admin\Documents\PSVXcmxDRsAtSqUpBp52BE74.exe" & exit3⤵PID:3032
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "PSVXcmxDRsAtSqUpBp52BE74.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵
- Executes dropped EXE
PID:1172
-
C:\Users\Admin\AppData\Local\Temp\5CB.exeC:\Users\Admin\AppData\Local\Temp\5CB.exe1⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\5CB.exeC:\Users\Admin\AppData\Local\Temp\5CB.exe2⤵PID:3664
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a0c25802-c1bd-47e1-a4ae-e0467dffc4cb" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\5CB.exe"C:\Users\Admin\AppData\Local\Temp\5CB.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\5CB.exe"C:\Users\Admin\AppData\Local\Temp\5CB.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:1352
-
C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build2.exe"C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build2.exe"5⤵PID:4712
-
C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build2.exe"C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build2.exe"6⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 9127⤵
- Program crash
PID:4640
-
-
-
-
C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build3.exe"C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build3.exe"5⤵PID:4900
-
C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build3.exe"C:\Users\Admin\AppData\Local\047d499f-5aa2-4bdd-ab60-e80e1fc7c2f2\build3.exe"6⤵PID:5012
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4332
-
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3680
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 85F5B6A1AA5EDC4EF3DF8EF424C04356 C2⤵PID:2636
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A31854E9D7B2E6A4A5D0C0395DABE96E2⤵PID:3376
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 515127152457B2A0D9C486DDBA853471 C2⤵PID:4508
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\1C96.exeC:\Users\Admin\AppData\Local\Temp\1C96.exe1⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\4A2C.exeC:\Users\Admin\AppData\Local\Temp\4A2C.exe1⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\7D9C.exeC:\Users\Admin\AppData\Local\Temp\7D9C.exe1⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"2⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\3⤵PID:3796
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\4⤵PID:4824
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\F442.exeC:\Users\Admin\AppData\Local\Temp\F442.exe1⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\7uSWD2TTcC.exe"C:\Users\Admin\AppData\Local\Temp\7uSWD2TTcC.exe"2⤵PID:1712
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\kj98jDGFJ5.exe"C:\Users\Admin\AppData\Local\Temp\kj98jDGFJ5.exe"2⤵
- Suspicious use of SetThreadContext
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat3⤵PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\F442.exe"2⤵PID:4136
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1880
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D3A37AC0-5320-4B74-B647-A4906D29FE45} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]1⤵PID:1784
-
C:\Users\Admin\AppData\Local\a0c25802-c1bd-47e1-a4ae-e0467dffc4cb\5CB.exeC:\Users\Admin\AppData\Local\a0c25802-c1bd-47e1-a4ae-e0467dffc4cb\5CB.exe --Task2⤵PID:3576
-
C:\Users\Admin\AppData\Local\a0c25802-c1bd-47e1-a4ae-e0467dffc4cb\5CB.exeC:\Users\Admin\AppData\Local\a0c25802-c1bd-47e1-a4ae-e0467dffc4cb\5CB.exe --Task3⤵PID:2968
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:568
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:3220
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:2064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:2948
-
-
C:\Users\Admin\AppData\Roaming\iudubtrC:\Users\Admin\AppData\Roaming\iudubtr2⤵PID:3752
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:2092
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1