Overview
overview
10Static
static
Setup (1).exe
windows7_x64
10Setup (1).exe
windows10_x64
10Setup (10).exe
windows7_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows7_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows7_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows7_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows7_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows7_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows7_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows7_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows7_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows7_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows7_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows7_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows7_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows7_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows7_x64
10Setup (23).exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
1794s -
max time network
1835s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
31-08-2021 19:51
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (10).exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (13).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (14).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Setup (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (16).exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
Setup (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (17).exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (2).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (20).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Setup (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (22).exe
Resource
win7v20210408
Behavioral task
behavioral30
Sample
Setup (22).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
Setup (23).exe
Resource
win10v20210408
General
-
Target
Setup (22).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
31.08
95.181.152.47:15089
Extracted
redline
spnewportspectr
135.148.139.222:1594
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral29/memory/2700-176-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral29/memory/2692-177-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral29/memory/2692-178-0x000000000041C6A6-mapping.dmp family_redline behavioral29/memory/2692-199-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral29/memory/3064-201-0x000000000041C6A6-mapping.dmp family_redline behavioral29/memory/2000-202-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral29/memory/2000-204-0x000000000041C5EE-mapping.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 33 IoCs
pid Process 824 F5I4nskzfS6SPUVOnnVvRZup.exe 1772 NvZhU668MYXMPb1NSz_7vyg1.exe 1016 2ibk8bMF5yYPSsEHZacCgJ31.exe 880 XObEuV_0NjVeM4QWw6ZR2x0s.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 984 Sl4MjhIOl7oOFVGc92iif3xt.exe 916 xk02GeCqSDeJQ6swfc59l3xr.exe 980 fRodzUzU6Qd6o9GZhcP8JCGu.exe 2016 zKgrcb0EIKIIafuI6xSI4Pmo.exe 1328 a8vNWGbygosrngLOngEb1PLO.exe 1728 VDdDr2fAl0GCa1cCFOl15DxP.exe 1916 9vnFBUfEcHu6eGRs2_Iiz1Nh.exe 1948 68lMl333gBhKp9MyTB07uyOd.exe 848 czamVW68ZibRGKTTvu4clLWS.exe 2036 k9UAM_uKJYUudBmWACOHaNe6.exe 1400 0i_ENcezKIVAbydvInbExLcr.exe 1824 yNanRaiZq4ANmKCXsDc2eA7Y.exe 1596 sbZCvrJAEGhBG4SfuWxoHX2S.exe 1588 pLhIUd01oDBT5zGR1L3FpRQK.exe 1700 BO7ddKC6Ud8FM8IwbbsPlnhb.exe 2060 uucUETaVGXpVhvODWbTShNS1.exe 2056 32103348435.exe 1416 19401104374.exe 2692 F5I4nskzfS6SPUVOnnVvRZup.exe 3064 F5I4nskzfS6SPUVOnnVvRZup.exe 2440 52970054678.exe 2136 BO7ddKC6Ud8FM8IwbbsPlnhb.exe 628 4ITlhcc1e5J4kZacgoEXIvh6.exe 2460 4ITlhcc1e5J4kZacgoEXIvh6.exe 3032 4ITlhcc1e5J4kZacgoEXIvh6.exe 2084 4ITlhcc1e5J4kZacgoEXIvh6.exe 2872 4ITlhcc1e5J4kZacgoEXIvh6.exe 936 59650447732.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ibk8bMF5yYPSsEHZacCgJ31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68lMl333gBhKp9MyTB07uyOd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68lMl333gBhKp9MyTB07uyOd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59650447732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59650447732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ibk8bMF5yYPSsEHZacCgJ31.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation Setup (22).exe -
Loads dropped DLL 41 IoCs
pid Process 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2028 Setup (22).exe 2948 cmd.exe 2960 cmd.exe 2280 cmd.exe 2280 cmd.exe 1368 cmd.exe 1368 cmd.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral29/files/0x000300000001312b-73.dat themida behavioral29/files/0x000300000001312d-71.dat themida behavioral29/files/0x000300000001312b-88.dat themida behavioral29/files/0x000300000001312d-87.dat themida behavioral29/files/0x000300000001315c-106.dat themida behavioral29/files/0x000300000001315c-134.dat themida behavioral29/memory/1016-171-0x0000000000290000-0x0000000000291000-memory.dmp themida behavioral29/memory/1948-175-0x0000000000C60000-0x0000000000C61000-memory.dmp themida behavioral29/files/0x000400000001316a-184.dat themida behavioral29/files/0x000400000001316a-185.dat themida behavioral29/memory/936-217-0x0000000000BF0000-0x0000000000BF1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68lMl333gBhKp9MyTB07uyOd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 59650447732.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2ibk8bMF5yYPSsEHZacCgJ31.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ipinfo.io 21 ipinfo.io 109 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1016 2ibk8bMF5yYPSsEHZacCgJ31.exe 1948 68lMl333gBhKp9MyTB07uyOd.exe 936 59650447732.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1728 set thread context of 2700 1728 VDdDr2fAl0GCa1cCFOl15DxP.exe 64 PID 824 set thread context of 2692 824 F5I4nskzfS6SPUVOnnVvRZup.exe 63 PID 824 set thread context of 3064 824 F5I4nskzfS6SPUVOnnVvRZup.exe 89 PID 1588 set thread context of 2000 1588 pLhIUd01oDBT5zGR1L3FpRQK.exe 91 PID 824 set thread context of 2936 824 F5I4nskzfS6SPUVOnnVvRZup.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2724 1596 WerFault.exe 60 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 19401104374.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 19401104374.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 52970054678.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 52970054678.exe -
Kills process with taskkill 2 IoCs
pid Process 2788 taskkill.exe 2888 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-552 = "North Asia Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" BO7ddKC6Ud8FM8IwbbsPlnhb.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (22).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Setup (22).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Setup (22).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup (22).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 zKgrcb0EIKIIafuI6xSI4Pmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e zKgrcb0EIKIIafuI6xSI4Pmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Setup (22).exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2028 Setup (22).exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 1016 2ibk8bMF5yYPSsEHZacCgJ31.exe 1016 2ibk8bMF5yYPSsEHZacCgJ31.exe 1700 BO7ddKC6Ud8FM8IwbbsPlnhb.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 508 4ITlhcc1e5J4kZacgoEXIvh6.exe 3064 F5I4nskzfS6SPUVOnnVvRZup.exe 936 59650447732.exe 936 59650447732.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1016 2ibk8bMF5yYPSsEHZacCgJ31.exe Token: SeDebugPrivilege 2788 taskkill.exe Token: SeDebugPrivilege 2724 WerFault.exe Token: SeDebugPrivilege 1700 BO7ddKC6Ud8FM8IwbbsPlnhb.exe Token: SeImpersonatePrivilege 1700 BO7ddKC6Ud8FM8IwbbsPlnhb.exe Token: SeDebugPrivilege 508 4ITlhcc1e5J4kZacgoEXIvh6.exe Token: SeDebugPrivilege 3064 F5I4nskzfS6SPUVOnnVvRZup.exe Token: SeDebugPrivilege 936 59650447732.exe Token: SeDebugPrivilege 2888 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1772 2028 Setup (22).exe 35 PID 2028 wrote to memory of 1772 2028 Setup (22).exe 35 PID 2028 wrote to memory of 1772 2028 Setup (22).exe 35 PID 2028 wrote to memory of 1772 2028 Setup (22).exe 35 PID 2028 wrote to memory of 824 2028 Setup (22).exe 36 PID 2028 wrote to memory of 824 2028 Setup (22).exe 36 PID 2028 wrote to memory of 824 2028 Setup (22).exe 36 PID 2028 wrote to memory of 824 2028 Setup (22).exe 36 PID 2028 wrote to memory of 984 2028 Setup (22).exe 34 PID 2028 wrote to memory of 984 2028 Setup (22).exe 34 PID 2028 wrote to memory of 984 2028 Setup (22).exe 34 PID 2028 wrote to memory of 984 2028 Setup (22).exe 34 PID 2028 wrote to memory of 508 2028 Setup (22).exe 33 PID 2028 wrote to memory of 508 2028 Setup (22).exe 33 PID 2028 wrote to memory of 508 2028 Setup (22).exe 33 PID 2028 wrote to memory of 508 2028 Setup (22).exe 33 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 1016 2028 Setup (22).exe 32 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 880 2028 Setup (22).exe 31 PID 2028 wrote to memory of 916 2028 Setup (22).exe 37 PID 2028 wrote to memory of 916 2028 Setup (22).exe 37 PID 2028 wrote to memory of 916 2028 Setup (22).exe 37 PID 2028 wrote to memory of 916 2028 Setup (22).exe 37 PID 2028 wrote to memory of 980 2028 Setup (22).exe 38 PID 2028 wrote to memory of 980 2028 Setup (22).exe 38 PID 2028 wrote to memory of 980 2028 Setup (22).exe 38 PID 2028 wrote to memory of 980 2028 Setup (22).exe 38 PID 2028 wrote to memory of 840 2028 Setup (22).exe 44 PID 2028 wrote to memory of 840 2028 Setup (22).exe 44 PID 2028 wrote to memory of 840 2028 Setup (22).exe 44 PID 2028 wrote to memory of 840 2028 Setup (22).exe 44 PID 2028 wrote to memory of 2016 2028 Setup (22).exe 43 PID 2028 wrote to memory of 2016 2028 Setup (22).exe 43 PID 2028 wrote to memory of 2016 2028 Setup (22).exe 43 PID 2028 wrote to memory of 2016 2028 Setup (22).exe 43 PID 2028 wrote to memory of 1328 2028 Setup (22).exe 46 PID 2028 wrote to memory of 1328 2028 Setup (22).exe 46 PID 2028 wrote to memory of 1328 2028 Setup (22).exe 46 PID 2028 wrote to memory of 1328 2028 Setup (22).exe 46 PID 2028 wrote to memory of 1728 2028 Setup (22).exe 45 PID 2028 wrote to memory of 1728 2028 Setup (22).exe 45 PID 2028 wrote to memory of 1728 2028 Setup (22).exe 45 PID 2028 wrote to memory of 1728 2028 Setup (22).exe 45 PID 2028 wrote to memory of 968 2028 Setup (22).exe 49 PID 2028 wrote to memory of 968 2028 Setup (22).exe 49 PID 2028 wrote to memory of 968 2028 Setup (22).exe 49 PID 2028 wrote to memory of 968 2028 Setup (22).exe 49 PID 2028 wrote to memory of 848 2028 Setup (22).exe 54 PID 2028 wrote to memory of 848 2028 Setup (22).exe 54 PID 2028 wrote to memory of 848 2028 Setup (22).exe 54 PID 2028 wrote to memory of 848 2028 Setup (22).exe 54 PID 2028 wrote to memory of 1948 2028 Setup (22).exe 55 PID 2028 wrote to memory of 1948 2028 Setup (22).exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (22).exe"C:\Users\Admin\AppData\Local\Temp\Setup (22).exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\Documents\XObEuV_0NjVeM4QWw6ZR2x0s.exe"C:\Users\Admin\Documents\XObEuV_0NjVeM4QWw6ZR2x0s.exe"2⤵
- Executes dropped EXE
PID:880
-
-
C:\Users\Admin\Documents\2ibk8bMF5yYPSsEHZacCgJ31.exe"C:\Users\Admin\Documents\2ibk8bMF5yYPSsEHZacCgJ31.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508 -
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"3⤵
- Executes dropped EXE
PID:628
-
-
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"3⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"3⤵
- Executes dropped EXE
PID:3032
-
-
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"3⤵
- Executes dropped EXE
PID:2084
-
-
C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"C:\Users\Admin\Documents\4ITlhcc1e5J4kZacgoEXIvh6.exe"3⤵
- Executes dropped EXE
PID:2872
-
-
-
C:\Users\Admin\Documents\Sl4MjhIOl7oOFVGc92iif3xt.exe"C:\Users\Admin\Documents\Sl4MjhIOl7oOFVGc92iif3xt.exe"2⤵
- Executes dropped EXE
PID:984
-
-
C:\Users\Admin\Documents\NvZhU668MYXMPb1NSz_7vyg1.exe"C:\Users\Admin\Documents\NvZhU668MYXMPb1NSz_7vyg1.exe"2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exe"C:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:824 -
C:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exeC:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exe3⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exeC:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exeC:\Users\Admin\Documents\F5I4nskzfS6SPUVOnnVvRZup.exe3⤵PID:2936
-
-
-
C:\Users\Admin\Documents\xk02GeCqSDeJQ6swfc59l3xr.exe"C:\Users\Admin\Documents\xk02GeCqSDeJQ6swfc59l3xr.exe"2⤵
- Executes dropped EXE
PID:916
-
-
C:\Users\Admin\Documents\fRodzUzU6Qd6o9GZhcP8JCGu.exe"C:\Users\Admin\Documents\fRodzUzU6Qd6o9GZhcP8JCGu.exe"2⤵
- Executes dropped EXE
PID:980
-
-
C:\Users\Admin\Documents\zKgrcb0EIKIIafuI6xSI4Pmo.exe"C:\Users\Admin\Documents\zKgrcb0EIKIIafuI6xSI4Pmo.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\32103348435.exe"3⤵
- Loads dropped DLL
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\32103348435.exe"C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\32103348435.exe"4⤵
- Executes dropped EXE
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\52970054678.exe" /mix3⤵
- Loads dropped DLL
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\52970054678.exe"C:\Users\Admin\AppData\Local\Temp\{4LBl-P41Ds-TqHY-qNm0j}\52970054678.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "zKgrcb0EIKIIafuI6xSI4Pmo.exe" /f & erase "C:\Users\Admin\Documents\zKgrcb0EIKIIafuI6xSI4Pmo.exe" & exit3⤵PID:2380
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "zKgrcb0EIKIIafuI6xSI4Pmo.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
-
C:\Users\Admin\Documents\pEH4PzJeCNDaWA2LluQedLCp.exe"C:\Users\Admin\Documents\pEH4PzJeCNDaWA2LluQedLCp.exe"2⤵PID:840
-
-
C:\Users\Admin\Documents\VDdDr2fAl0GCa1cCFOl15DxP.exe"C:\Users\Admin\Documents\VDdDr2fAl0GCa1cCFOl15DxP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1728 -
C:\Users\Admin\Documents\VDdDr2fAl0GCa1cCFOl15DxP.exeC:\Users\Admin\Documents\VDdDr2fAl0GCa1cCFOl15DxP.exe3⤵PID:2700
-
-
-
C:\Users\Admin\Documents\a8vNWGbygosrngLOngEb1PLO.exe"C:\Users\Admin\Documents\a8vNWGbygosrngLOngEb1PLO.exe"2⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\Documents\VBR1HIUqtoFgwqLAZLiYZTb6.exe"C:\Users\Admin\Documents\VBR1HIUqtoFgwqLAZLiYZTb6.exe"2⤵PID:968
-
-
C:\Users\Admin\Documents\0i_ENcezKIVAbydvInbExLcr.exe"C:\Users\Admin\Documents\0i_ENcezKIVAbydvInbExLcr.exe"2⤵
- Executes dropped EXE
PID:1400 -
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵PID:2816
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵PID:2824
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:2876
-
-
-
C:\Users\Admin\Documents\k9UAM_uKJYUudBmWACOHaNe6.exe"C:\Users\Admin\Documents\k9UAM_uKJYUudBmWACOHaNe6.exe"2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Users\Admin\Documents\yNanRaiZq4ANmKCXsDc2eA7Y.exe"C:\Users\Admin\Documents\yNanRaiZq4ANmKCXsDc2eA7Y.exe"2⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\59650447732.exe"3⤵
- Loads dropped DLL
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\59650447732.exe"C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\59650447732.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\19401104374.exe" /mix3⤵
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\19401104374.exe"C:\Users\Admin\AppData\Local\Temp\{E6Qx-hgXkW-hIQH-RYcxl}\19401104374.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "yNanRaiZq4ANmKCXsDc2eA7Y.exe" /f & erase "C:\Users\Admin\Documents\yNanRaiZq4ANmKCXsDc2eA7Y.exe" & exit3⤵PID:1756
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "yNanRaiZq4ANmKCXsDc2eA7Y.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
-
C:\Users\Admin\Documents\9vnFBUfEcHu6eGRs2_Iiz1Nh.exe"C:\Users\Admin\Documents\9vnFBUfEcHu6eGRs2_Iiz1Nh.exe"2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Users\Admin\Documents\czamVW68ZibRGKTTvu4clLWS.exe"C:\Users\Admin\Documents\czamVW68ZibRGKTTvu4clLWS.exe"2⤵
- Executes dropped EXE
PID:848
-
-
C:\Users\Admin\Documents\68lMl333gBhKp9MyTB07uyOd.exe"C:\Users\Admin\Documents\68lMl333gBhKp9MyTB07uyOd.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1948
-
-
C:\Users\Admin\Documents\uucUETaVGXpVhvODWbTShNS1.exe"C:\Users\Admin\Documents\uucUETaVGXpVhvODWbTShNS1.exe"2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Users\Admin\Documents\BO7ddKC6Ud8FM8IwbbsPlnhb.exe"C:\Users\Admin\Documents\BO7ddKC6Ud8FM8IwbbsPlnhb.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Users\Admin\Documents\BO7ddKC6Ud8FM8IwbbsPlnhb.exe"C:\Users\Admin\Documents\BO7ddKC6Ud8FM8IwbbsPlnhb.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2136
-
-
-
C:\Users\Admin\Documents\pLhIUd01oDBT5zGR1L3FpRQK.exe"C:\Users\Admin\Documents\pLhIUd01oDBT5zGR1L3FpRQK.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1588 -
C:\Users\Admin\Documents\pLhIUd01oDBT5zGR1L3FpRQK.exeC:\Users\Admin\Documents\pLhIUd01oDBT5zGR1L3FpRQK.exe3⤵PID:2000
-
-
-
C:\Users\Admin\Documents\sbZCvrJAEGhBG4SfuWxoHX2S.exe"C:\Users\Admin\Documents\sbZCvrJAEGhBG4SfuWxoHX2S.exe"2⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 12843⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-