Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/09/2021, 17:41
210909-v9lgtabfhq 1009/09/2021, 04:26
210909-e21nrsfee3 1008/09/2021, 21:37
210908-1gnpcsfbc9 1008/09/2021, 21:29
210908-1bx1vafbc5 1008/09/2021, 13:52
210908-q6fd6shgdj 1007/09/2021, 18:07
210907-wqa3eagcgr 10Analysis
-
max time kernel
26s -
max time network
74s -
platform
windows10_x64 -
resource
win10-jp -
submitted
08/09/2021, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
2.9MB
-
MD5
3f1f81101d0ce95fdfac97f5913cd662
-
SHA1
8e615a64e4d72b08926242b7d73a608bdd7e9fce
-
SHA256
90aa6a7c770f2c0f49596731c80fda7d044802dea9e905ff999b39cda5428407
-
SHA512
a776c1f8636ef90d294becf8d09a45366463364026837c19e13227c1c5c9a6656b6fa525e0eec5a1a46997b6ef7066e958c02523a7c4538d046f8b2091145285
Malware Config
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
redline
Jayson
95.181.172.207:56915
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
vidar
40.5
916
https://gheorghip.tumblr.com/
-
profile_id
916
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral4/memory/4888-606-0x0000000002C80000-0x000000000359E000-memory.dmp family_glupteba behavioral4/memory/4888-611-0x0000000000400000-0x0000000002575000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 4376 rundll32.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5924 4376 rundll32.exe 70 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 11 IoCs
resource yara_rule behavioral4/memory/2916-215-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral4/memory/2916-216-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/4840-236-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/1640-277-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/1640-295-0x0000000005100000-0x0000000005706000-memory.dmp family_redline behavioral4/memory/4932-674-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/5740-709-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/5176-739-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/5488-763-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/1432-782-0x000000000041C5E2-mapping.dmp family_redline behavioral4/memory/908-795-0x000000000041C5E2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000400000001ab62-159.dat family_socelars behavioral4/files/0x000400000001ab62-173.dat family_socelars -
resource yara_rule behavioral4/files/0x000400000001ab66-153.dat redline behavioral4/files/0x000400000001ab66-166.dat redline behavioral4/files/0x000400000001ab66-217.dat redline behavioral4/files/0x000400000001ab66-237.dat redline behavioral4/files/0x000400000001ab66-279.dat redline behavioral4/files/0x000400000001ab66-355.dat redline behavioral4/files/0x000400000001ab66-466.dat redline behavioral4/files/0x000400000001ab66-516.dat redline -
Vidar Stealer 4 IoCs
resource yara_rule behavioral4/memory/1272-210-0x00000000046F0000-0x00000000047C1000-memory.dmp family_vidar behavioral4/memory/1272-211-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar behavioral4/memory/2668-571-0x0000000004840000-0x0000000004911000-memory.dmp family_vidar behavioral4/memory/2668-573-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000400000001ab5a-122.dat aspack_v212_v242 behavioral4/files/0x000400000001ab5a-125.dat aspack_v212_v242 behavioral4/files/0x000400000001ab5c-128.dat aspack_v212_v242 behavioral4/files/0x000400000001ab5c-129.dat aspack_v212_v242 behavioral4/files/0x000400000001ab59-124.dat aspack_v212_v242 behavioral4/files/0x000400000001ab59-130.dat aspack_v212_v242 behavioral4/files/0x000400000001ab59-131.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 3356 setup_installer.exe 4084 setup_install.exe 848 Tue11b9d76a96506.exe 1196 Tue11d7385a978cc.exe 1516 Tue11e4e580f2e8141a3.exe 1576 Tue11f251db82fb7b.exe 2076 Tue118f55232e4.exe 2056 Tue1109eec571ac.exe 2208 Tue11b9d76a96506.tmp 1272 Tue112c483dd3245d.exe 2408 Tue11bc0507b56295.exe 2344 Tue11141271fbe5877f.exe 2916 Tue11e4e580f2e8141a3.exe 4840 Tue11e4e580f2e8141a3.exe 1640 Tue11e4e580f2e8141a3.exe -
Loads dropped DLL 7 IoCs
pid Process 4084 setup_install.exe 4084 setup_install.exe 4084 setup_install.exe 4084 setup_install.exe 4084 setup_install.exe 4084 setup_install.exe 2208 Tue11b9d76a96506.tmp -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Tue11b9d76a96506.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1516 set thread context of 2916 1516 Tue11e4e580f2e8141a3.exe 108 PID 1516 set thread context of 4840 1516 Tue11e4e580f2e8141a3.exe 109 PID 1516 set thread context of 1640 1516 Tue11e4e580f2e8141a3.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 20 IoCs
pid pid_target Process procid_target 1008 2056 WerFault.exe 106 4612 2056 WerFault.exe 106 2400 2056 WerFault.exe 106 4424 2056 WerFault.exe 106 3200 2056 WerFault.exe 106 4952 4084 WerFault.exe 84 4916 2056 WerFault.exe 106 2876 2056 WerFault.exe 106 696 1272 WerFault.exe 107 3728 2056 WerFault.exe 106 2308 2056 WerFault.exe 106 368 2056 WerFault.exe 106 3916 1144 WerFault.exe 136 636 1144 WerFault.exe 136 1092 1144 WerFault.exe 136 2640 1144 WerFault.exe 136 4436 1144 WerFault.exe 136 5460 1144 WerFault.exe 136 5656 1144 WerFault.exe 136 5856 1144 WerFault.exe 136 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5384 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5968 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 428 taskkill.exe 4680 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1408 powershell.exe 1408 powershell.exe 2408 Tue11bc0507b56295.exe 2408 Tue11bc0507b56295.exe 1408 powershell.exe 1408 powershell.exe 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 1008 LzmwAqmV.exe 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 2172 Process not Found 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe 4612 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2408 Tue11bc0507b56295.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeCreateTokenPrivilege 2076 Tue118f55232e4.exe Token: SeAssignPrimaryTokenPrivilege 2076 Tue118f55232e4.exe Token: SeLockMemoryPrivilege 2076 Tue118f55232e4.exe Token: SeIncreaseQuotaPrivilege 2076 Tue118f55232e4.exe Token: SeMachineAccountPrivilege 2076 Tue118f55232e4.exe Token: SeTcbPrivilege 2076 Tue118f55232e4.exe Token: SeSecurityPrivilege 2076 Tue118f55232e4.exe Token: SeTakeOwnershipPrivilege 2076 Tue118f55232e4.exe Token: SeLoadDriverPrivilege 2076 Tue118f55232e4.exe Token: SeSystemProfilePrivilege 2076 Tue118f55232e4.exe Token: SeSystemtimePrivilege 2076 Tue118f55232e4.exe Token: SeProfSingleProcessPrivilege 2076 Tue118f55232e4.exe Token: SeIncBasePriorityPrivilege 2076 Tue118f55232e4.exe Token: SeCreatePagefilePrivilege 2076 Tue118f55232e4.exe Token: SeCreatePermanentPrivilege 2076 Tue118f55232e4.exe Token: SeBackupPrivilege 2076 Tue118f55232e4.exe Token: SeRestorePrivilege 2076 Tue118f55232e4.exe Token: SeShutdownPrivilege 2076 Tue118f55232e4.exe Token: SeDebugPrivilege 2076 Tue118f55232e4.exe Token: SeAuditPrivilege 2076 Tue118f55232e4.exe Token: SeSystemEnvironmentPrivilege 2076 Tue118f55232e4.exe Token: SeChangeNotifyPrivilege 2076 Tue118f55232e4.exe Token: SeRemoteShutdownPrivilege 2076 Tue118f55232e4.exe Token: SeUndockPrivilege 2076 Tue118f55232e4.exe Token: SeSyncAgentPrivilege 2076 Tue118f55232e4.exe Token: SeEnableDelegationPrivilege 2076 Tue118f55232e4.exe Token: SeManageVolumePrivilege 2076 Tue118f55232e4.exe Token: SeImpersonatePrivilege 2076 Tue118f55232e4.exe Token: SeCreateGlobalPrivilege 2076 Tue118f55232e4.exe Token: 31 2076 Tue118f55232e4.exe Token: 32 2076 Tue118f55232e4.exe Token: 33 2076 Tue118f55232e4.exe Token: 34 2076 Tue118f55232e4.exe Token: 35 2076 Tue118f55232e4.exe Token: SeDebugPrivilege 1576 Tue11f251db82fb7b.exe Token: SeDebugPrivilege 1408 powershell.exe Token: SeDebugPrivilege 2344 Tue11141271fbe5877f.exe Token: SeRestorePrivilege 1008 WerFault.exe Token: SeBackupPrivilege 1008 WerFault.exe Token: SeDebugPrivilege 1008 LzmwAqmV.exe Token: SeDebugPrivilege 4612 WerFault.exe Token: SeDebugPrivilege 2400 WerFault.exe Token: SeDebugPrivilege 4424 WerFault.exe Token: SeDebugPrivilege 3200 3002.exe Token: SeDebugPrivilege 4952 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 3356 5028 setup_x86_x64_install.exe 83 PID 5028 wrote to memory of 3356 5028 setup_x86_x64_install.exe 83 PID 5028 wrote to memory of 3356 5028 setup_x86_x64_install.exe 83 PID 3356 wrote to memory of 4084 3356 setup_installer.exe 84 PID 3356 wrote to memory of 4084 3356 setup_installer.exe 84 PID 3356 wrote to memory of 4084 3356 setup_installer.exe 84 PID 4084 wrote to memory of 4580 4084 setup_install.exe 87 PID 4084 wrote to memory of 4580 4084 setup_install.exe 87 PID 4084 wrote to memory of 4580 4084 setup_install.exe 87 PID 4084 wrote to memory of 4576 4084 setup_install.exe 88 PID 4084 wrote to memory of 4576 4084 setup_install.exe 88 PID 4084 wrote to memory of 4576 4084 setup_install.exe 88 PID 4084 wrote to memory of 4656 4084 setup_install.exe 101 PID 4084 wrote to memory of 4656 4084 setup_install.exe 101 PID 4084 wrote to memory of 4656 4084 setup_install.exe 101 PID 4084 wrote to memory of 556 4084 setup_install.exe 100 PID 4084 wrote to memory of 556 4084 setup_install.exe 100 PID 4084 wrote to memory of 556 4084 setup_install.exe 100 PID 4084 wrote to memory of 668 4084 setup_install.exe 99 PID 4084 wrote to memory of 668 4084 setup_install.exe 99 PID 4084 wrote to memory of 668 4084 setup_install.exe 99 PID 4084 wrote to memory of 716 4084 setup_install.exe 92 PID 4084 wrote to memory of 716 4084 setup_install.exe 92 PID 4084 wrote to memory of 716 4084 setup_install.exe 92 PID 4656 wrote to memory of 848 4656 cmd.exe 89 PID 4656 wrote to memory of 848 4656 cmd.exe 89 PID 4656 wrote to memory of 848 4656 cmd.exe 89 PID 4084 wrote to memory of 1000 4084 setup_install.exe 91 PID 4084 wrote to memory of 1000 4084 setup_install.exe 91 PID 4084 wrote to memory of 1000 4084 setup_install.exe 91 PID 4084 wrote to memory of 612 4084 setup_install.exe 90 PID 4084 wrote to memory of 612 4084 setup_install.exe 90 PID 4084 wrote to memory of 612 4084 setup_install.exe 90 PID 4084 wrote to memory of 1160 4084 setup_install.exe 98 PID 4084 wrote to memory of 1160 4084 setup_install.exe 98 PID 4084 wrote to memory of 1160 4084 setup_install.exe 98 PID 4576 wrote to memory of 1196 4576 cmd.exe 93 PID 4576 wrote to memory of 1196 4576 cmd.exe 93 PID 4576 wrote to memory of 1196 4576 cmd.exe 93 PID 4084 wrote to memory of 1216 4084 setup_install.exe 97 PID 4084 wrote to memory of 1216 4084 setup_install.exe 97 PID 4084 wrote to memory of 1216 4084 setup_install.exe 97 PID 4580 wrote to memory of 1408 4580 cmd.exe 94 PID 4580 wrote to memory of 1408 4580 cmd.exe 94 PID 4580 wrote to memory of 1408 4580 cmd.exe 94 PID 1000 wrote to memory of 1516 1000 cmd.exe 96 PID 1000 wrote to memory of 1516 1000 cmd.exe 96 PID 1000 wrote to memory of 1516 1000 cmd.exe 96 PID 556 wrote to memory of 1576 556 cmd.exe 95 PID 556 wrote to memory of 1576 556 cmd.exe 95 PID 1160 wrote to memory of 2076 1160 cmd.exe 105 PID 1160 wrote to memory of 2076 1160 cmd.exe 105 PID 1160 wrote to memory of 2076 1160 cmd.exe 105 PID 668 wrote to memory of 2056 668 cmd.exe 106 PID 668 wrote to memory of 2056 668 cmd.exe 106 PID 668 wrote to memory of 2056 668 cmd.exe 106 PID 1216 wrote to memory of 1272 1216 cmd.exe 107 PID 1216 wrote to memory of 1272 1216 cmd.exe 107 PID 1216 wrote to memory of 1272 1216 cmd.exe 107 PID 848 wrote to memory of 2208 848 Tue11b9d76a96506.exe 102 PID 848 wrote to memory of 2208 848 Tue11b9d76a96506.exe 102 PID 848 wrote to memory of 2208 848 Tue11b9d76a96506.exe 102 PID 716 wrote to memory of 2408 716 cmd.exe 103 PID 716 wrote to memory of 2408 716 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11d7385a978cc.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11d7385a978cc.exeTue11d7385a978cc.exe5⤵
- Executes dropped EXE
PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11141271fbe5877f.exe4⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11141271fbe5877f.exeTue11141271fbe5877f.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11e4e580f2e8141a3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeTue11e4e580f2e8141a3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:5136
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11e4e580f2e8141a3.exe6⤵PID:5836
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11bc0507b56295.exe4⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11bc0507b56295.exeTue11bc0507b56295.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue112c483dd3245d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue112c483dd3245d.exeTue112c483dd3245d.exe5⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 11726⤵
- Program crash
PID:696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue118f55232e4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue118f55232e4.exeTue118f55232e4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1372
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:428
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue1109eec571ac.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue1109eec571ac.exeTue1109eec571ac.exe /mixone5⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 6566⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 6726⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 7726⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 8206⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 8326⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 9086⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 11446⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 12846⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 12966⤵
- Program crash
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 13006⤵
- Program crash
PID:368
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11f251db82fb7b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11b9d76a96506.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 4764⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11b9d76a96506.exeTue11b9d76a96506.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\is-LHT13.tmp\Tue11b9d76a96506.tmp"C:\Users\Admin\AppData\Local\Temp\is-LHT13.tmp\Tue11b9d76a96506.tmp" /SL5="$50032,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11b9d76a96506.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC1DF1E54\Tue11f251db82fb7b.exeTue11f251db82fb7b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"3⤵PID:3828
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵PID:1172
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Creates scheduled task(s)
PID:5384
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"4⤵PID:5472
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"3⤵PID:2256
-
C:\Users\Admin\AppData\Roaming\1208665.exe"C:\Users\Admin\AppData\Roaming\1208665.exe"4⤵PID:1568
-
-
C:\Users\Admin\AppData\Roaming\6591367.exe"C:\Users\Admin\AppData\Roaming\6591367.exe"4⤵PID:688
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"5⤵PID:3916
-
-
-
C:\Users\Admin\AppData\Roaming\7961487.exe"C:\Users\Admin\AppData\Roaming\7961487.exe"4⤵PID:4516
-
-
C:\Users\Admin\AppData\Roaming\4314784.exe"C:\Users\Admin\AppData\Roaming\4314784.exe"4⤵PID:2308
-
-
C:\Users\Admin\AppData\Roaming\4035852.exe"C:\Users\Admin\AppData\Roaming\4035852.exe"4⤵PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"3⤵PID:2668
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Alfanewfile2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe" & del C:\ProgramData\*.dll & exit4⤵PID:5792
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Alfanewfile2.exe /f5⤵
- Kills process with taskkill
PID:4680
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:5968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"4⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵PID:5728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8084⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8284⤵
- Program crash
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8924⤵
- Program crash
PID:1092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 11604⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 12444⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 14524⤵
- Program crash
PID:5460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 14764⤵
- Program crash
PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8004⤵
- Program crash
PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"3⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\is-7FS9Q.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-7FS9Q.tmp\setup_2.tmp" /SL5="$801D2,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT5⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\is-S4MN7.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-S4MN7.tmp\setup_2.tmp" /SL5="$30260,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT6⤵PID:4368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"3⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"3⤵PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"3⤵PID:1936
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:184
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:688
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5936
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:5456