Overview
overview
10Static
static
Setup (1).exe
windows11_x64
10Setup (10).exe
windows11_x64
10Setup (11).exe
windows11_x64
10Setup (12).exe
windows11_x64
10Setup (13).exe
windows11_x64
10Setup (14).exe
windows11_x64
10Setup (15).exe
windows11_x64
10Setup (16).exe
windows11_x64
10Setup (17).exe
windows11_x64
10Setup (18).exe
windows11_x64
10Setup (19).exe
windows11_x64
10Setup (2).exe
windows11_x64
10Setup (20).exe
windows11_x64
10Setup (21).exe
windows11_x64
10Setup (22).exe
windows11_x64
10Setup (23).exe
windows11_x64
10Setup (24).exe
windows11_x64
10Setup (25).exe
windows11_x64
10Setup (26).exe
windows11_x64
10Setup (27).exe
windows11_x64
10Setup (28).exe
windows11_x64
10Setup (29).exe
windows11_x64
10Setup (3).exe
windows11_x64
10Setup (30).exe
windows11_x64
10Setup (31).exe
windows11_x64
10Setup (4).exe
windows11_x64
10Setup (5).exe
windows11_x64
10Setup (6).exe
windows11_x64
10Setup (7).exe
windows11_x64
10Setup (8).exe
windows11_x64
10Setup (9).exe
windows11_x64
10Setup.exe
windows11_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
89s -
max time network
1750s -
platform
windows11_x64 -
resource
win11 -
submitted
31-08-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win11
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win11
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win11
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win11
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win11
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win11
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win11
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win11
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win11
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win11
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win11
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win11
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win11
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win11
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win11
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win11
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win11
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (20).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
raccoon
10c753321b3ff323727f510579572aa4c5ea00cb
-
url4cnc
https://telete.in/bimboDinotrex
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2172 created 4896 2172 WerFault.exe 101 -
Downloads MZ/PE file
-
Executes dropped EXE 23 IoCs
pid Process 3712 qEeoHDVkLYmYym4VHnE58V3L.exe 3820 357gWJaaD8BhZ8bt1RIRIiDE.exe 3916 pQCArMOtRn8oC3TZ4VUJH3eR.exe 4136 GQfc9lb4uh8KHzTSjT2hZMl7.exe 1480 0G_oZ4A26rNd2sEAkeuPPe8B.exe 3992 aFEr3n4UhnnigLBnws3AgDir.exe 4404 cVhKyH0S1pNhb3p_2K_2C83h.exe 4896 RydnLyYmoI6ANnLoFqfFIDTo.exe 3976 JTPhsXPu43F8_nLNvWU98UXk.exe 4412 JhKU4pe2uswJZa4xjKZRH63h.exe 1600 aboK8jZ_XEfz93_DAdlxxhgK.exe 2996 4tIlVMs5C03eEuhEiglEnB5r.exe 4736 MwhRIfe9CTwb4YiVWdsmr5WC.exe 3012 0CpY4NIL0hC7Ke9H2pKqPtp9.exe 880 V7RCvwBSnIC0JTOLbetcr89A.exe 3128 d0EuJ7lURMXwhEJ17y29m59_.exe 500 BJNeVZLZ6gXzTBt5EEA7oqiK.exe 932 ViJzT0ETqkk3EdejaeVGsHOS.exe 1132 yv_Xy8avOlEotjqgnCOSDteL.exe 1548 NI22fLLmoEW0efMdjGctFFJh.exe 1612 NE7rBNACqwf_jiiC76iHW_IH.exe 1556 F16LFWU0jEzg9rkyjbQWJVbW.exe 2176 5Mwd5XJAOCweLHOFFD9VtmEM.exe -
resource yara_rule behavioral13/files/0x000200000002b1b1-161.dat themida behavioral13/files/0x000500000002b1d2-156.dat themida behavioral13/files/0x000700000002b1db-201.dat themida behavioral13/files/0x000500000002b1d2-225.dat themida behavioral13/files/0x000200000002b1b1-256.dat themida behavioral13/files/0x000700000002b1db-260.dat themida -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 7 ip-api.com 76 ipinfo.io 147 ipinfo.io 156 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2712 4896 WerFault.exe 101 3296 3976 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 800 schtasks.exe 3108 schtasks.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 154 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 Setup (20).exe 4528 Setup (20).exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2712 WerFault.exe Token: SeBackupPrivilege 2712 WerFault.exe Token: SeBackupPrivilege 2712 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3712 4528 Setup (20).exe 91 PID 4528 wrote to memory of 3712 4528 Setup (20).exe 91 PID 4528 wrote to memory of 3712 4528 Setup (20).exe 91 PID 4528 wrote to memory of 3820 4528 Setup (20).exe 92 PID 4528 wrote to memory of 3820 4528 Setup (20).exe 92 PID 4528 wrote to memory of 3820 4528 Setup (20).exe 92 PID 4528 wrote to memory of 3916 4528 Setup (20).exe 93 PID 4528 wrote to memory of 3916 4528 Setup (20).exe 93 PID 4528 wrote to memory of 3916 4528 Setup (20).exe 93 PID 4528 wrote to memory of 1480 4528 Setup (20).exe 104 PID 4528 wrote to memory of 1480 4528 Setup (20).exe 104 PID 4528 wrote to memory of 4136 4528 Setup (20).exe 105 PID 4528 wrote to memory of 4136 4528 Setup (20).exe 105 PID 4528 wrote to memory of 4136 4528 Setup (20).exe 105 PID 4528 wrote to memory of 3992 4528 Setup (20).exe 106 PID 4528 wrote to memory of 3992 4528 Setup (20).exe 106 PID 4528 wrote to memory of 3992 4528 Setup (20).exe 106 PID 4528 wrote to memory of 4404 4528 Setup (20).exe 103 PID 4528 wrote to memory of 4404 4528 Setup (20).exe 103 PID 4528 wrote to memory of 4404 4528 Setup (20).exe 103 PID 4528 wrote to memory of 3976 4528 Setup (20).exe 102 PID 4528 wrote to memory of 3976 4528 Setup (20).exe 102 PID 4528 wrote to memory of 3976 4528 Setup (20).exe 102 PID 4528 wrote to memory of 4896 4528 Setup (20).exe 101 PID 4528 wrote to memory of 4896 4528 Setup (20).exe 101 PID 4528 wrote to memory of 4896 4528 Setup (20).exe 101 PID 4528 wrote to memory of 4412 4528 Setup (20).exe 98 PID 4528 wrote to memory of 4412 4528 Setup (20).exe 98 PID 4528 wrote to memory of 4412 4528 Setup (20).exe 98 PID 4528 wrote to memory of 1600 4528 Setup (20).exe 99 PID 4528 wrote to memory of 1600 4528 Setup (20).exe 99 PID 4528 wrote to memory of 1600 4528 Setup (20).exe 99 PID 4528 wrote to memory of 2996 4528 Setup (20).exe 97 PID 4528 wrote to memory of 2996 4528 Setup (20).exe 97 PID 4528 wrote to memory of 2996 4528 Setup (20).exe 97 PID 4528 wrote to memory of 4736 4528 Setup (20).exe 96 PID 4528 wrote to memory of 4736 4528 Setup (20).exe 96 PID 4528 wrote to memory of 3012 4528 Setup (20).exe 114 PID 4528 wrote to memory of 3012 4528 Setup (20).exe 114 PID 4528 wrote to memory of 3012 4528 Setup (20).exe 114 PID 4528 wrote to memory of 880 4528 Setup (20).exe 113 PID 4528 wrote to memory of 880 4528 Setup (20).exe 113 PID 4528 wrote to memory of 880 4528 Setup (20).exe 113 PID 4528 wrote to memory of 500 4528 Setup (20).exe 111 PID 4528 wrote to memory of 500 4528 Setup (20).exe 111 PID 4528 wrote to memory of 500 4528 Setup (20).exe 111 PID 4528 wrote to memory of 3128 4528 Setup (20).exe 112 PID 4528 wrote to memory of 3128 4528 Setup (20).exe 112 PID 4528 wrote to memory of 3128 4528 Setup (20).exe 112 PID 4528 wrote to memory of 932 4528 Setup (20).exe 110 PID 4528 wrote to memory of 932 4528 Setup (20).exe 110 PID 4528 wrote to memory of 932 4528 Setup (20).exe 110 PID 4528 wrote to memory of 1132 4528 Setup (20).exe 108 PID 4528 wrote to memory of 1132 4528 Setup (20).exe 108 PID 4528 wrote to memory of 1132 4528 Setup (20).exe 108 PID 4528 wrote to memory of 1548 4528 Setup (20).exe 107 PID 4528 wrote to memory of 1548 4528 Setup (20).exe 107 PID 4528 wrote to memory of 1548 4528 Setup (20).exe 107 PID 4528 wrote to memory of 1612 4528 Setup (20).exe 119 PID 4528 wrote to memory of 1612 4528 Setup (20).exe 119 PID 4528 wrote to memory of 1612 4528 Setup (20).exe 119 PID 4528 wrote to memory of 1556 4528 Setup (20).exe 117 PID 4528 wrote to memory of 1556 4528 Setup (20).exe 117 PID 4528 wrote to memory of 1556 4528 Setup (20).exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (20).exe"C:\Users\Admin\AppData\Local\Temp\Setup (20).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\Documents\qEeoHDVkLYmYym4VHnE58V3L.exe"C:\Users\Admin\Documents\qEeoHDVkLYmYym4VHnE58V3L.exe"2⤵
- Executes dropped EXE
PID:3712
-
-
C:\Users\Admin\Documents\357gWJaaD8BhZ8bt1RIRIiDE.exe"C:\Users\Admin\Documents\357gWJaaD8BhZ8bt1RIRIiDE.exe"2⤵
- Executes dropped EXE
PID:3820
-
-
C:\Users\Admin\Documents\pQCArMOtRn8oC3TZ4VUJH3eR.exe"C:\Users\Admin\Documents\pQCArMOtRn8oC3TZ4VUJH3eR.exe"2⤵
- Executes dropped EXE
PID:3916
-
-
C:\Users\Admin\Documents\MwhRIfe9CTwb4YiVWdsmr5WC.exe"C:\Users\Admin\Documents\MwhRIfe9CTwb4YiVWdsmr5WC.exe"2⤵
- Executes dropped EXE
PID:4736
-
-
C:\Users\Admin\Documents\4tIlVMs5C03eEuhEiglEnB5r.exe"C:\Users\Admin\Documents\4tIlVMs5C03eEuhEiglEnB5r.exe"2⤵
- Executes dropped EXE
PID:2996
-
-
C:\Users\Admin\Documents\JhKU4pe2uswJZa4xjKZRH63h.exe"C:\Users\Admin\Documents\JhKU4pe2uswJZa4xjKZRH63h.exe"2⤵
- Executes dropped EXE
PID:4412
-
-
C:\Users\Admin\Documents\aboK8jZ_XEfz93_DAdlxxhgK.exe"C:\Users\Admin\Documents\aboK8jZ_XEfz93_DAdlxxhgK.exe"2⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KBAvfsr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KBAvfsr.exe"3⤵PID:3552
-
-
-
C:\Users\Admin\Documents\RydnLyYmoI6ANnLoFqfFIDTo.exe"C:\Users\Admin\Documents\RydnLyYmoI6ANnLoFqfFIDTo.exe"2⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 2763⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
C:\Users\Admin\Documents\JTPhsXPu43F8_nLNvWU98UXk.exe"C:\Users\Admin\Documents\JTPhsXPu43F8_nLNvWU98UXk.exe"2⤵
- Executes dropped EXE
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 2723⤵
- Program crash
PID:3296
-
-
-
C:\Users\Admin\Documents\cVhKyH0S1pNhb3p_2K_2C83h.exe"C:\Users\Admin\Documents\cVhKyH0S1pNhb3p_2K_2C83h.exe"2⤵
- Executes dropped EXE
PID:4404
-
-
C:\Users\Admin\Documents\0G_oZ4A26rNd2sEAkeuPPe8B.exe"C:\Users\Admin\Documents\0G_oZ4A26rNd2sEAkeuPPe8B.exe"2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\Documents\GQfc9lb4uh8KHzTSjT2hZMl7.exe"C:\Users\Admin\Documents\GQfc9lb4uh8KHzTSjT2hZMl7.exe"2⤵
- Executes dropped EXE
PID:4136
-
-
C:\Users\Admin\Documents\aFEr3n4UhnnigLBnws3AgDir.exe"C:\Users\Admin\Documents\aFEr3n4UhnnigLBnws3AgDir.exe"2⤵
- Executes dropped EXE
PID:3992
-
-
C:\Users\Admin\Documents\NI22fLLmoEW0efMdjGctFFJh.exe"C:\Users\Admin\Documents\NI22fLLmoEW0efMdjGctFFJh.exe"2⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\Documents\yv_Xy8avOlEotjqgnCOSDteL.exe"C:\Users\Admin\Documents\yv_Xy8avOlEotjqgnCOSDteL.exe"2⤵
- Executes dropped EXE
PID:1132
-
-
C:\Users\Admin\Documents\ViJzT0ETqkk3EdejaeVGsHOS.exe"C:\Users\Admin\Documents\ViJzT0ETqkk3EdejaeVGsHOS.exe"2⤵
- Executes dropped EXE
PID:932
-
-
C:\Users\Admin\Documents\BJNeVZLZ6gXzTBt5EEA7oqiK.exe"C:\Users\Admin\Documents\BJNeVZLZ6gXzTBt5EEA7oqiK.exe"2⤵
- Executes dropped EXE
PID:500
-
-
C:\Users\Admin\Documents\d0EuJ7lURMXwhEJ17y29m59_.exe"C:\Users\Admin\Documents\d0EuJ7lURMXwhEJ17y29m59_.exe"2⤵
- Executes dropped EXE
PID:3128 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵PID:3628
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵PID:2920
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:2276
-
-
-
C:\Users\Admin\Documents\V7RCvwBSnIC0JTOLbetcr89A.exe"C:\Users\Admin\Documents\V7RCvwBSnIC0JTOLbetcr89A.exe"2⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3108
-
-
-
C:\Users\Admin\Documents\0CpY4NIL0hC7Ke9H2pKqPtp9.exe"C:\Users\Admin\Documents\0CpY4NIL0hC7Ke9H2pKqPtp9.exe"2⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\Documents\0CpY4NIL0hC7Ke9H2pKqPtp9.exe"C:\Users\Admin\Documents\0CpY4NIL0hC7Ke9H2pKqPtp9.exe"3⤵PID:3928
-
-
-
C:\Users\Admin\Documents\F16LFWU0jEzg9rkyjbQWJVbW.exe"C:\Users\Admin\Documents\F16LFWU0jEzg9rkyjbQWJVbW.exe"2⤵
- Executes dropped EXE
PID:1556
-
-
C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe"C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe"2⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if """"== """" for %m in ( ""C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))3⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if ""== "" for %m in ("C:\Users\Admin\Documents\NE7rBNACqwf_jiiC76iHW_IH.exe" ) do taskkill /iM "%~NXm" -F4⤵PID:2432
-
-
-
-
C:\Users\Admin\Documents\5Mwd5XJAOCweLHOFFD9VtmEM.exe"C:\Users\Admin\Documents\5Mwd5XJAOCweLHOFFD9VtmEM.exe"2⤵
- Executes dropped EXE
PID:2176
-
-
C:\Users\Admin\Documents\do42QgN8AErqMmcU84dscQ2f.exe"C:\Users\Admin\Documents\do42QgN8AErqMmcU84dscQ2f.exe"2⤵PID:3224
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv yKasnM7UgUqICmWI3CBItg.0.21⤵
- Modifies data under HKEY_USERS
PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4896 -ip 48961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2172
-
C:\Users\Admin\AppData\Local\Temp\is-H2J4N.tmp\do42QgN8AErqMmcU84dscQ2f.tmp"C:\Users\Admin\AppData\Local\Temp\is-H2J4N.tmp\do42QgN8AErqMmcU84dscQ2f.tmp" /SL5="$10284,138429,56832,C:\Users\Admin\Documents\do42QgN8AErqMmcU84dscQ2f.exe"1⤵PID:4432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3976 -ip 39761⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1132 -ip 11321⤵PID:1976