Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
07-09-2021 17:26
210907-vzzaxsdae6 1007-09-2021 13:18
210907-qkaa2acfe3 1006-09-2021 17:52
210906-wfz9jsbch4 1006-09-2021 17:51
210906-wfnwhsbch3 1006-09-2021 13:27
210906-qp3hdaedaj 1006-09-2021 09:28
210906-lfpgyaeael 1006-09-2021 04:33
210906-e6mmpsaaa2 1005-09-2021 05:25
210905-f4h26sfab6 1004-09-2021 21:32
210904-1dqdsahfdj 1004-09-2021 21:19
210904-z56z6shfck 10Analysis
-
max time kernel
46s -
max time network
578s -
platform
windows10_x64 -
resource
win10-en -
submitted
05-09-2021 05:25
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-en
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
2.2MB
-
MD5
e3b3a95ef03de0de77cca7a54ea22c94
-
SHA1
d318d234f8f27f25de660d9881113df9d11c24ff
-
SHA256
baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15
-
SHA512
3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d
Malware Config
Extracted
vidar
40.4
706
https://romkaxarit.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 3384 rundll32.exe 19 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 3384 rundll32.exe 19 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral9/memory/3448-285-0x0000000004D30000-0x0000000004D5E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral9/memory/4368-278-0x0000000003E40000-0x0000000003F13000-memory.dmp family_vidar behavioral9/memory/4368-300-0x0000000000400000-0x00000000021BE000-memory.dmp family_vidar -
resource yara_rule behavioral9/files/0x000500000001ab19-122.dat aspack_v212_v242 behavioral9/files/0x000500000001ab19-125.dat aspack_v212_v242 behavioral9/files/0x000600000001ab18-123.dat aspack_v212_v242 behavioral9/files/0x000500000001ab1b-128.dat aspack_v212_v242 behavioral9/files/0x000600000001ab18-131.dat aspack_v212_v242 behavioral9/files/0x000600000001ab18-130.dat aspack_v212_v242 behavioral9/files/0x000500000001ab1b-129.dat aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 1504 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 35 IoCs
pid Process 5060 setup_installer.exe 2868 setup_install.exe 4368 Fri1544861ac3fe6a.exe 2776 Fri155442fc38b.exe 700 Fri15af75ee9b.exe 2668 Fri157e25afd971.exe 4424 Fri1553f0ee90.exe 4440 Fri156ec98815f89c.exe 1504 rundll32.exe 1556 LzmwAqmV.exe 1616 Chrome 5.exe 2484 PublicDwlBrowser1100.exe 2648 2.exe 1508 setup.exe 1208 5158395.exe 1212 zab2our.exe 4988 Pubdate.exe 4760 5411537.exe 1868 setup_2.exe 3448 4687479.exe 4208 3002.exe 4244 setup_2.tmp 4420 jhuuee.exe 1428 BearVpn 3.exe 196 8569861.exe 2192 setup_2.exe 3748 8098945.exe 4964 4949573.exe 4712 WinHoster.exe 3184 3501459.exe 1324 1242339.exe 3168 setup_2.tmp 1792 3816385.exe 2272 3002.exe 908 8056319.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8098945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8098945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3816385.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3816385.exe -
Loads dropped DLL 9 IoCs
pid Process 2868 setup_install.exe 2868 setup_install.exe 2868 setup_install.exe 2868 setup_install.exe 2868 setup_install.exe 2868 setup_install.exe 1504 rundll32.exe 4244 setup_2.tmp 3168 setup_2.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral9/files/0x000600000001ab50-279.dat themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5411537.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8098945.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3816385.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 ip-api.com 119 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3748 8098945.exe 1792 3816385.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-48RUH.tmp setup_2.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
pid pid_target Process procid_target 2724 2648 WerFault.exe 99 5112 4368 WerFault.exe 88 3160 4368 WerFault.exe 88 1224 1508 WerFault.exe 100 5108 4368 WerFault.exe 88 5156 1508 WerFault.exe 100 5224 4368 WerFault.exe 88 5296 1508 WerFault.exe 100 5412 4368 WerFault.exe 88 5452 1508 WerFault.exe 100 5628 4368 WerFault.exe 88 5748 1508 WerFault.exe 100 5940 4368 WerFault.exe 88 6000 1508 WerFault.exe 100 6120 1508 WerFault.exe 100 424 4368 WerFault.exe 88 5616 4368 WerFault.exe 88 6072 4368 WerFault.exe 88 7004 4368 WerFault.exe 88 7044 4368 WerFault.exe 88 7364 4368 WerFault.exe 88 7524 4368 WerFault.exe 88 7912 4368 WerFault.exe 88 864 1208 WerFault.exe 102 6200 4368 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri15af75ee9b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri15af75ee9b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri15af75ee9b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 700 Fri15af75ee9b.exe 700 Fri15af75ee9b.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 5112 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe 3160 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 700 Fri15af75ee9b.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4712 WinHoster.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4424 Fri1553f0ee90.exe Token: SeDebugPrivilege 2776 Fri155442fc38b.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 2648 2.exe Token: SeDebugPrivilege 2484 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 1208 5158395.exe Token: SeDebugPrivilege 1428 BearVpn 3.exe Token: SeDebugPrivilege 2724 WerFault.exe Token: SeDebugPrivilege 196 8569861.exe Token: SeDebugPrivilege 3184 3501459.exe Token: SeRestorePrivilege 5112 WerFault.exe Token: SeBackupPrivilege 5112 WerFault.exe Token: SeBackupPrivilege 5112 WerFault.exe Token: SeDebugPrivilege 5112 WerFault.exe Token: SeDebugPrivilege 1212 zab2our.exe Token: SeDebugPrivilege 3160 WerFault.exe Token: SeDebugPrivilege 908 8056319.exe Token: SeDebugPrivilege 1224 WerFault.exe Token: SeDebugPrivilege 5108 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3168 setup_2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 5060 4564 setup_x86_x64_install.exe 75 PID 4564 wrote to memory of 5060 4564 setup_x86_x64_install.exe 75 PID 4564 wrote to memory of 5060 4564 setup_x86_x64_install.exe 75 PID 5060 wrote to memory of 2868 5060 setup_installer.exe 77 PID 5060 wrote to memory of 2868 5060 setup_installer.exe 77 PID 5060 wrote to memory of 2868 5060 setup_installer.exe 77 PID 2868 wrote to memory of 4192 2868 setup_install.exe 80 PID 2868 wrote to memory of 4192 2868 setup_install.exe 80 PID 2868 wrote to memory of 4192 2868 setup_install.exe 80 PID 2868 wrote to memory of 4172 2868 setup_install.exe 81 PID 2868 wrote to memory of 4172 2868 setup_install.exe 81 PID 2868 wrote to memory of 4172 2868 setup_install.exe 81 PID 2868 wrote to memory of 4160 2868 setup_install.exe 82 PID 2868 wrote to memory of 4160 2868 setup_install.exe 82 PID 2868 wrote to memory of 4160 2868 setup_install.exe 82 PID 2868 wrote to memory of 4248 2868 setup_install.exe 83 PID 2868 wrote to memory of 4248 2868 setup_install.exe 83 PID 2868 wrote to memory of 4248 2868 setup_install.exe 83 PID 2868 wrote to memory of 4288 2868 setup_install.exe 84 PID 2868 wrote to memory of 4288 2868 setup_install.exe 84 PID 2868 wrote to memory of 4288 2868 setup_install.exe 84 PID 2868 wrote to memory of 4356 2868 setup_install.exe 87 PID 2868 wrote to memory of 4356 2868 setup_install.exe 87 PID 2868 wrote to memory of 4356 2868 setup_install.exe 87 PID 2868 wrote to memory of 4336 2868 setup_install.exe 85 PID 2868 wrote to memory of 4336 2868 setup_install.exe 85 PID 2868 wrote to memory of 4336 2868 setup_install.exe 85 PID 2868 wrote to memory of 4272 2868 setup_install.exe 86 PID 2868 wrote to memory of 4272 2868 setup_install.exe 86 PID 2868 wrote to memory of 4272 2868 setup_install.exe 86 PID 4172 wrote to memory of 4368 4172 cmd.exe 88 PID 4172 wrote to memory of 4368 4172 cmd.exe 88 PID 4172 wrote to memory of 4368 4172 cmd.exe 88 PID 4288 wrote to memory of 2776 4288 cmd.exe 89 PID 4288 wrote to memory of 2776 4288 cmd.exe 89 PID 4192 wrote to memory of 2820 4192 cmd.exe 90 PID 4192 wrote to memory of 2820 4192 cmd.exe 90 PID 4192 wrote to memory of 2820 4192 cmd.exe 90 PID 4356 wrote to memory of 700 4356 cmd.exe 91 PID 4356 wrote to memory of 700 4356 cmd.exe 91 PID 4356 wrote to memory of 700 4356 cmd.exe 91 PID 4248 wrote to memory of 2668 4248 cmd.exe 94 PID 4248 wrote to memory of 2668 4248 cmd.exe 94 PID 4248 wrote to memory of 2668 4248 cmd.exe 94 PID 4272 wrote to memory of 4424 4272 cmd.exe 93 PID 4272 wrote to memory of 4424 4272 cmd.exe 93 PID 4160 wrote to memory of 4440 4160 cmd.exe 92 PID 4160 wrote to memory of 4440 4160 cmd.exe 92 PID 4160 wrote to memory of 4440 4160 cmd.exe 92 PID 2668 wrote to memory of 1504 2668 Fri157e25afd971.exe 158 PID 2668 wrote to memory of 1504 2668 Fri157e25afd971.exe 158 PID 2668 wrote to memory of 1504 2668 Fri157e25afd971.exe 158 PID 4424 wrote to memory of 1556 4424 Fri1553f0ee90.exe 96 PID 4424 wrote to memory of 1556 4424 Fri1553f0ee90.exe 96 PID 4424 wrote to memory of 1556 4424 Fri1553f0ee90.exe 96 PID 1556 wrote to memory of 1616 1556 svchost.exe 97 PID 1556 wrote to memory of 1616 1556 svchost.exe 97 PID 1556 wrote to memory of 2484 1556 svchost.exe 98 PID 1556 wrote to memory of 2484 1556 svchost.exe 98 PID 1556 wrote to memory of 2648 1556 svchost.exe 99 PID 1556 wrote to memory of 2648 1556 svchost.exe 99 PID 1556 wrote to memory of 1508 1556 svchost.exe 100 PID 1556 wrote to memory of 1508 1556 svchost.exe 100 PID 1556 wrote to memory of 1508 1556 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri1544861ac3fe6a.exeFri1544861ac3fe6a.exe5⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 7646⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 8006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 8046⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 8286⤵
- Program crash
PID:5224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 9606⤵
- Program crash
PID:5412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 9966⤵
- Program crash
PID:5628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 10686⤵
- Program crash
PID:5940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 14206⤵
- Program crash
PID:424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 16046⤵
- Program crash
PID:5616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 14046⤵
- Program crash
PID:6072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 16726⤵
- Program crash
PID:7004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 13926⤵
- Program crash
PID:7044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 17726⤵
- Program crash
PID:7364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 17086⤵
- Program crash
PID:7524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 17206⤵
- Program crash
PID:7912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 18486⤵
- Program crash
PID:6200
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri156ec98815f89c.exeFri156ec98815f89c.exe5⤵
- Executes dropped EXE
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri157e25afd971.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri157e25afd971.exeFri157e25afd971.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\is-0FEHP.tmp\Fri157e25afd971.tmp"C:\Users\Admin\AppData\Local\Temp\is-0FEHP.tmp\Fri157e25afd971.tmp" /SL5="$60048,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri157e25afd971.exe"6⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\is-LIINF.tmp\zab2our.exe"C:\Users\Admin\AppData\Local\Temp\is-LIINF.tmp\zab2our.exe" /S /UID=burnerch27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Program Files\Windows Portable Devices\LUSUFWZJOG\ultramediaburner.exe"C:\Program Files\Windows Portable Devices\LUSUFWZJOG\ultramediaburner.exe" /VERYSILENT8⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\is-NOFCC.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-NOFCC.tmp\ultramediaburner.tmp" /SL5="$102D0,281924,62464,C:\Program Files\Windows Portable Devices\LUSUFWZJOG\ultramediaburner.exe" /VERYSILENT9⤵PID:5432
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:5724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\55-45b7e-65b-99981-498449890e889\Tobaebolozhy.exe"C:\Users\Admin\AppData\Local\Temp\55-45b7e-65b-99981-498449890e889\Tobaebolozhy.exe"8⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\9a-82530-1d1-88d82-0f9bf80654499\Ralinogego.exe"C:\Users\Admin\AppData\Local\Temp\9a-82530-1d1-88d82-0f9bf80654499\Ralinogego.exe"8⤵PID:5664
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tdt4zikj.u3u\GcleanerEU.exe /eufive & exit9⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\tdt4zikj.u3u\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\tdt4zikj.u3u\GcleanerEU.exe /eufive10⤵PID:7184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yx0h43cq.lzr\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:7132
-
C:\Users\Admin\AppData\Local\Temp\yx0h43cq.lzr\installer.exeC:\Users\Admin\AppData\Local\Temp\yx0h43cq.lzr\installer.exe /qn CAMPAIGN="654"10⤵PID:7424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1w50v4n3.p2i\anyname.exe & exit9⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\1w50v4n3.p2i\anyname.exeC:\Users\Admin\AppData\Local\Temp\1w50v4n3.p2i\anyname.exe10⤵PID:7592
-
C:\Users\Admin\AppData\Local\Temp\1w50v4n3.p2i\anyname.exe"C:\Users\Admin\AppData\Local\Temp\1w50v4n3.p2i\anyname.exe" -u11⤵PID:7768
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri155442fc38b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri155442fc38b.exeFri155442fc38b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Users\Admin\AppData\Roaming\5158395.exe"C:\Users\Admin\AppData\Roaming\5158395.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1208 -s 19367⤵
- Program crash
PID:864
-
-
-
C:\Users\Admin\AppData\Roaming\4687479.exe"C:\Users\Admin\AppData\Roaming\4687479.exe"6⤵
- Executes dropped EXE
PID:3448
-
-
C:\Users\Admin\AppData\Roaming\8098945.exe"C:\Users\Admin\AppData\Roaming\8098945.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3748
-
-
C:\Users\Admin\AppData\Roaming\3501459.exe"C:\Users\Admin\AppData\Roaming\3501459.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Users\Admin\AppData\Roaming\5411537.exe"C:\Users\Admin\AppData\Roaming\5411537.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4760
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME7.exe4⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri1553f0ee90.exeFri1553f0ee90.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:5628
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:4404
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Roaming\1242339.exe"C:\Users\Admin\AppData\Roaming\1242339.exe"8⤵
- Executes dropped EXE
PID:1324
-
-
C:\Users\Admin\AppData\Roaming\4949573.exe"C:\Users\Admin\AppData\Roaming\4949573.exe"8⤵
- Executes dropped EXE
PID:4964
-
-
C:\Users\Admin\AppData\Roaming\8569861.exe"C:\Users\Admin\AppData\Roaming\8569861.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:196
-
-
C:\Users\Admin\AppData\Roaming\3816385.exe"C:\Users\Admin\AppData\Roaming\3816385.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\8056319.exe"C:\Users\Admin\AppData\Roaming\8056319.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2648 -s 15288⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 7968⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 8408⤵
- Program crash
PID:5156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 9048⤵
- Program crash
PID:5296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 8848⤵
- Program crash
PID:5452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 10928⤵
- Program crash
PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 11448⤵
- Program crash
PID:6000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 7888⤵
- Program crash
PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"7⤵
- Executes dropped EXE
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\is-EQQUI.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-EQQUI.tmp\setup_2.tmp" /SL5="$101F8,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:2192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\7zS4C3BCB24\Fri15af75ee9b.exeFri15af75ee9b.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-35SKK.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-35SKK.tmp\setup_2.tmp" /SL5="$10220,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3168
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4712
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4044
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
PID:1504
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4976
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7196
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7312
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:8004
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B4C1A8A9BBF331B79D054C8E030E0E78 C2⤵PID:2756
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ada855 /state1:0x41c64e6d1⤵PID:6212
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6592
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵
- Suspicious use of WriteProcessMemory
PID:1556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:7564