Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
09-09-2021 17:41
210909-v9lgtabfhq 1009-09-2021 04:26
210909-e21nrsfee3 1008-09-2021 21:37
210908-1gnpcsfbc9 1008-09-2021 21:29
210908-1bx1vafbc5 1008-09-2021 13:52
210908-q6fd6shgdj 1007-09-2021 18:07
210907-wqa3eagcgr 10Analysis
-
max time kernel
606s -
max time network
608s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-09-2021 13:52
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
General
-
Target
setup_x86_x64_install.exe
-
Size
2.9MB
-
MD5
3f1f81101d0ce95fdfac97f5913cd662
-
SHA1
8e615a64e4d72b08926242b7d73a608bdd7e9fce
-
SHA256
90aa6a7c770f2c0f49596731c80fda7d044802dea9e905ff999b39cda5428407
-
SHA512
a776c1f8636ef90d294becf8d09a45366463364026837c19e13227c1c5c9a6656b6fa525e0eec5a1a46997b6ef7066e958c02523a7c4538d046f8b2091145285
Malware Config
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
vidar
40.5
916
https://gheorghip.tumblr.com/
-
profile_id
916
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 2252 rundll32.exe 54 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2252 rundll32.exe 54 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral3/memory/864-270-0x000000000041C5E2-mapping.dmp family_redline behavioral3/memory/2896-307-0x000000000041C5E2-mapping.dmp family_redline behavioral3/memory/1648-330-0x000000000041C5E2-mapping.dmp family_redline behavioral3/memory/3004-336-0x000000000041C5E2-mapping.dmp family_redline behavioral3/memory/2792-350-0x000000000041C5E2-mapping.dmp family_redline behavioral3/memory/2716-359-0x000000000041C5E2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 5 IoCs
resource yara_rule behavioral3/files/0x00030000000130d7-129.dat family_socelars behavioral3/files/0x00030000000130d7-173.dat family_socelars behavioral3/files/0x00030000000130d7-177.dat family_socelars behavioral3/files/0x00030000000130d7-181.dat family_socelars behavioral3/files/0x00030000000130d7-183.dat family_socelars -
resource yara_rule behavioral3/files/0x00030000000130db-118.dat redline behavioral3/files/0x00030000000130db-152.dat redline behavioral3/files/0x00030000000130db-151.dat redline behavioral3/files/0x00030000000130db-158.dat redline behavioral3/files/0x00030000000130db-164.dat redline behavioral3/files/0x00030000000130db-163.dat redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral3/memory/928-189-0x0000000003080000-0x0000000003151000-memory.dmp family_vidar behavioral3/memory/928-190-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar behavioral3/memory/2572-233-0x0000000003180000-0x0000000003251000-memory.dmp family_vidar behavioral3/memory/2572-235-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x00030000000130cf-76.dat aspack_v212_v242 behavioral3/files/0x00030000000130cf-77.dat aspack_v212_v242 behavioral3/files/0x00040000000130ca-78.dat aspack_v212_v242 behavioral3/files/0x00040000000130ca-79.dat aspack_v212_v242 behavioral3/files/0x00030000000130d1-82.dat aspack_v212_v242 behavioral3/files/0x00030000000130d1-83.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 46807GHF____.exe -
Executes dropped EXE 64 IoCs
pid Process 1072 setup_installer.exe 1680 setup_install.exe 1468 Tue11f251db82fb7b.exe 1612 Tue11d7385a978cc.exe 1760 Tue11b9d76a96506.exe 1676 Tue11bc0507b56295.exe 1160 Tue11141271fbe5877f.exe 1844 Tue11e4e580f2e8141a3.exe 928 Tue112c483dd3245d.exe 1156 Tue118f55232e4.exe 2040 Tue11b9d76a96506.tmp 2424 LzmwAqmV.exe 2464 46807GHF____.exe 2504 Chrome 5.exe 2548 PublicDwlBrowser1100.exe 2572 Alfanewfile2.exe 2588 8083238.exe 2660 2.exe 2684 setup.exe 2848 setup_2.exe 2864 190079.exe 2912 3002.exe 2968 jhuuee.exe 3004 BearVpn 3.exe 3016 3002.exe 2780 Tue11e4e580f2e8141a3.exe 1220 2284054.exe 1988 WinHoster.exe 836 Tue11e4e580f2e8141a3.exe 2072 LzmwAqmV.exe 2492 7142836.exe 864 Tue11e4e580f2e8141a3.exe 2752 Tue11e4e580f2e8141a3.exe 2060 5633140.exe 1856 Tue11e4e580f2e8141a3.exe 2900 4058250.exe 752 Tue11e4e580f2e8141a3.exe 2124 1510327.exe 2896 Tue11e4e580f2e8141a3.exe 3036 Tue11e4e580f2e8141a3.exe 2988 6764081.exe 1160 services64.exe 1648 Tue11e4e580f2e8141a3.exe 3008 4953219.exe 3004 Tue11e4e580f2e8141a3.exe 1584 6955880.exe 1728 Tue11e4e580f2e8141a3.exe 2440 Tue11e4e580f2e8141a3.exe 2792 Tue11e4e580f2e8141a3.exe 2716 Tue11e4e580f2e8141a3.exe 268 Tue11e4e580f2e8141a3.exe 1960 Tue11e4e580f2e8141a3.exe 3108 Tue11e4e580f2e8141a3.exe 3156 Tue11e4e580f2e8141a3.exe 3196 Tue11e4e580f2e8141a3.exe 3308 Tue11e4e580f2e8141a3.exe 3376 Tue11e4e580f2e8141a3.exe 3432 Tue11e4e580f2e8141a3.exe 3544 Tue11e4e580f2e8141a3.exe 3600 Tue11e4e580f2e8141a3.exe 3700 Tue11e4e580f2e8141a3.exe 3740 Tue11e4e580f2e8141a3.exe 3800 Tue11e4e580f2e8141a3.exe 3832 Tue11e4e580f2e8141a3.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6764081.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2284054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2284054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7142836.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7142836.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4953219.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4953219.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6764081.exe -
Loads dropped DLL 64 IoCs
pid Process 1088 setup_x86_x64_install.exe 1072 setup_installer.exe 1072 setup_installer.exe 1072 setup_installer.exe 1072 setup_installer.exe 1072 setup_installer.exe 1072 setup_installer.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 1680 setup_install.exe 612 cmd.exe 864 cmd.exe 1052 cmd.exe 1376 cmd.exe 1376 cmd.exe 1612 Tue11d7385a978cc.exe 1612 Tue11d7385a978cc.exe 1132 cmd.exe 1800 cmd.exe 1800 cmd.exe 1676 Tue11bc0507b56295.exe 1676 Tue11bc0507b56295.exe 1760 Tue11b9d76a96506.exe 1760 Tue11b9d76a96506.exe 1844 Tue11e4e580f2e8141a3.exe 1844 Tue11e4e580f2e8141a3.exe 1492 cmd.exe 1492 cmd.exe 1280 cmd.exe 928 Tue112c483dd3245d.exe 928 Tue112c483dd3245d.exe 1156 Tue118f55232e4.exe 1156 Tue118f55232e4.exe 1760 Tue11b9d76a96506.exe 2040 Tue11b9d76a96506.tmp 2040 Tue11b9d76a96506.tmp 2040 Tue11b9d76a96506.tmp 2388 rundll32.exe 2388 rundll32.exe 2388 rundll32.exe 2388 rundll32.exe 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe 2040 Tue11b9d76a96506.tmp 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe 2572 Alfanewfile2.exe 2572 Alfanewfile2.exe 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe 1844 Tue11e4e580f2e8141a3.exe 2424 LzmwAqmV.exe 2684 setup.exe 2864 190079.exe 2864 190079.exe 2424 LzmwAqmV.exe 2424 LzmwAqmV.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows NT\\ZHuxowewunu.exe\"" 46807GHF____.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 190079.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6764081.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2284054.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7142836.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4953219.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1220 2284054.exe 2492 7142836.exe 3008 4953219.exe 2988 6764081.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1844 set thread context of 864 1844 Tue11e4e580f2e8141a3.exe 79 PID 1844 set thread context of 2896 1844 Tue11e4e580f2e8141a3.exe 93 PID 1844 set thread context of 1648 1844 Tue11e4e580f2e8141a3.exe 100 PID 1844 set thread context of 3004 1844 Tue11e4e580f2e8141a3.exe 107 PID 1844 set thread context of 2792 1844 Tue11e4e580f2e8141a3.exe 114 PID 1844 set thread context of 2716 1844 Tue11e4e580f2e8141a3.exe 115 PID 1844 set thread context of 3156 1844 Tue11e4e580f2e8141a3.exe 119 PID 1844 set thread context of 3196 1844 Tue11e4e580f2e8141a3.exe 121 PID 1844 set thread context of 3376 1844 Tue11e4e580f2e8141a3.exe 123 PID 1844 set thread context of 3544 1844 Tue11e4e580f2e8141a3.exe 125 PID 1844 set thread context of 3600 1844 Tue11e4e580f2e8141a3.exe 126 PID 1844 set thread context of 3740 1844 Tue11e4e580f2e8141a3.exe 128 PID 1844 set thread context of 3832 1844 Tue11e4e580f2e8141a3.exe 130 PID 1844 set thread context of 3944 1844 Tue11e4e580f2e8141a3.exe 133 PID 1844 set thread context of 4000 1844 Tue11e4e580f2e8141a3.exe 134 PID 1844 set thread context of 3292 1844 Tue11e4e580f2e8141a3.exe 138 PID 1844 set thread context of 2720 1844 Tue11e4e580f2e8141a3.exe 140 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\ZHuxowewunu.exe 46807GHF____.exe File created C:\Program Files (x86)\Windows NT\ZHuxowewunu.exe.config 46807GHF____.exe File created C:\Program Files\Reference Assemblies\VQAAZDJEIR\ultramediaburner.exe 46807GHF____.exe File created C:\Program Files\Reference Assemblies\VQAAZDJEIR\ultramediaburner.exe.config 46807GHF____.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 3020 928 WerFault.exe 49 2508 2572 WerFault.exe 61 3176 2588 WerFault.exe 62 3952 2060 WerFault.exe 90 3340 2900 WerFault.exe 92 3496 1584 WerFault.exe 112 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue11bc0507b56295.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1584 schtasks.exe -
Kills process with taskkill 2 IoCs
pid Process 1228 taskkill.exe 2124 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c076803ccaa4d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006eb41742ea43ed4ba1e7ff66848d555500000000020000000000106600000001000020000000762c493176bf8213a76a688b5322bb12d9e7a3c19acb47ba363688b394d0eae6000000000e8000000002000020000000df11d3b5f729b16ee2bb90742861d2a7c49798976c93b5ec566e5e7bb554406d200000001dae9ab2a67e45719ff88c67f1eefd23f397f7d1da423fe84f682453c41bcd584000000065ebe69a49f939ef31cabdda956499cdbae61aa6ea77781cff6f09321b94c9351f06136316091e3777b831129ff2af141dcfa4fa3790c90ac4cb54328ed6b6e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "337881545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BC5F310-10BD-11EC-AEA4-C2292E95568B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Alfanewfile2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Tue118f55232e4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Alfanewfile2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Tue118f55232e4.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 47 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 Tue11bc0507b56295.exe 1676 Tue11bc0507b56295.exe 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 2020 powershell.exe 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1352 Process not Found 3176 WerFault.exe 3952 WerFault.exe 3340 WerFault.exe 3496 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1676 Tue11bc0507b56295.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1988 WinHoster.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1468 Tue11f251db82fb7b.exe Token: SeDebugPrivilege 1160 Tue11141271fbe5877f.exe Token: SeCreateTokenPrivilege 1156 Tue118f55232e4.exe Token: SeAssignPrimaryTokenPrivilege 1156 Tue118f55232e4.exe Token: SeLockMemoryPrivilege 1156 Tue118f55232e4.exe Token: SeIncreaseQuotaPrivilege 1156 Tue118f55232e4.exe Token: SeMachineAccountPrivilege 1156 Tue118f55232e4.exe Token: SeTcbPrivilege 1156 Tue118f55232e4.exe Token: SeSecurityPrivilege 1156 Tue118f55232e4.exe Token: SeTakeOwnershipPrivilege 1156 Tue118f55232e4.exe Token: SeLoadDriverPrivilege 1156 Tue118f55232e4.exe Token: SeSystemProfilePrivilege 1156 Tue118f55232e4.exe Token: SeSystemtimePrivilege 1156 Tue118f55232e4.exe Token: SeProfSingleProcessPrivilege 1156 Tue118f55232e4.exe Token: SeIncBasePriorityPrivilege 1156 Tue118f55232e4.exe Token: SeCreatePagefilePrivilege 1156 Tue118f55232e4.exe Token: SeCreatePermanentPrivilege 1156 Tue118f55232e4.exe Token: SeBackupPrivilege 1156 Tue118f55232e4.exe Token: SeRestorePrivilege 1156 Tue118f55232e4.exe Token: SeShutdownPrivilege 1156 Tue118f55232e4.exe Token: SeDebugPrivilege 1156 Tue118f55232e4.exe Token: SeAuditPrivilege 1156 Tue118f55232e4.exe Token: SeSystemEnvironmentPrivilege 1156 Tue118f55232e4.exe Token: SeChangeNotifyPrivilege 1156 Tue118f55232e4.exe Token: SeRemoteShutdownPrivilege 1156 Tue118f55232e4.exe Token: SeUndockPrivilege 1156 Tue118f55232e4.exe Token: SeSyncAgentPrivilege 1156 Tue118f55232e4.exe Token: SeEnableDelegationPrivilege 1156 Tue118f55232e4.exe Token: SeManageVolumePrivilege 1156 Tue118f55232e4.exe Token: SeImpersonatePrivilege 1156 Tue118f55232e4.exe Token: SeCreateGlobalPrivilege 1156 Tue118f55232e4.exe Token: 31 1156 Tue118f55232e4.exe Token: 32 1156 Tue118f55232e4.exe Token: 33 1156 Tue118f55232e4.exe Token: 34 1156 Tue118f55232e4.exe Token: 35 1156 Tue118f55232e4.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 2548 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 2660 2.exe Token: SeDebugPrivilege 2588 8083238.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 3004 BearVpn 3.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2124 taskkill.exe Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeShutdownPrivilege 1352 Process not Found Token: SeDebugPrivilege 2060 5633140.exe Token: SeDebugPrivilege 1220 2284054.exe Token: SeDebugPrivilege 2492 7142836.exe Token: SeDebugPrivilege 2900 4058250.exe Token: SeDebugPrivilege 864 Tue11e4e580f2e8141a3.exe Token: SeDebugPrivilege 1228 taskkill.exe Token: SeDebugPrivilege 2896 Tue11e4e580f2e8141a3.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1228 iexplore.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found 1352 Process not Found -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 iexplore.exe 1228 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1088 wrote to memory of 1072 1088 setup_x86_x64_install.exe 26 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1072 wrote to memory of 1680 1072 setup_installer.exe 30 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 620 1680 setup_install.exe 32 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 864 1680 setup_install.exe 33 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 1052 1680 setup_install.exe 34 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 612 1680 setup_install.exe 35 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1536 1680 setup_install.exe 36 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1376 1680 setup_install.exe 37 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1800 1680 setup_install.exe 38 PID 1680 wrote to memory of 1132 1680 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0345F184\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:620
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11d7385a978cc.exe4⤵
- Loads dropped DLL
PID:864 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11d7385a978cc.exeTue11d7385a978cc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11b9d76a96506.exe4⤵
- Loads dropped DLL
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11b9d76a96506.exeTue11b9d76a96506.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\is-T1C4B.tmp\Tue11b9d76a96506.tmp"C:\Users\Admin\AppData\Local\Temp\is-T1C4B.tmp\Tue11b9d76a96506.tmp" /SL5="$40130,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11b9d76a96506.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\is-U63D1.tmp\46807GHF____.exe"C:\Users\Admin\AppData\Local\Temp\is-U63D1.tmp\46807GHF____.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:2464 -
C:\Program Files\Reference Assemblies\VQAAZDJEIR\ultramediaburner.exe"C:\Program Files\Reference Assemblies\VQAAZDJEIR\ultramediaburner.exe" /VERYSILENT8⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\8d-f2eac-537-14dab-503367727200a\Gozhashowupe.exe"C:\Users\Admin\AppData\Local\Temp\8d-f2eac-537-14dab-503367727200a\Gozhashowupe.exe"8⤵PID:3308
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\75-7951c-23f-0d2a9-ba0bfb857ee94\Wapopoheba.exe"C:\Users\Admin\AppData\Local\Temp\75-7951c-23f-0d2a9-ba0bfb857ee94\Wapopoheba.exe"8⤵PID:2524
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11f251db82fb7b.exe4⤵
- Loads dropped DLL
PID:612 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11f251db82fb7b.exeTue11f251db82fb7b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:2740
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:1584
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Users\Admin\AppData\Roaming\5633140.exe"C:\Users\Admin\AppData\Roaming\5633140.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2060 -s 17289⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:3952
-
-
-
C:\Users\Admin\AppData\Roaming\1510327.exe"C:\Users\Admin\AppData\Roaming\1510327.exe"8⤵
- Executes dropped EXE
PID:2124
-
-
C:\Users\Admin\AppData\Roaming\6764081.exe"C:\Users\Admin\AppData\Roaming\6764081.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2988
-
-
C:\Users\Admin\AppData\Roaming\4953219.exe"C:\Users\Admin\AppData\Roaming\4953219.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3008
-
-
C:\Users\Admin\AppData\Roaming\6955880.exe"C:\Users\Admin\AppData\Roaming\6955880.exe"8⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 18009⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:3496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 9768⤵
- Program crash
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:568
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue1109eec571ac.exe /mixone4⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11bc0507b56295.exe4⤵
- Loads dropped DLL
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11bc0507b56295.exeTue11bc0507b56295.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11e4e580f2e8141a3.exe4⤵
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeTue11e4e580f2e8141a3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11e4e580f2e8141a3.exe6⤵PID:1508
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11141271fbe5877f.exe4⤵
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue11141271fbe5877f.exeTue11141271fbe5877f.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\ProgramData\8083238.exe"C:\ProgramData\8083238.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2588 -s 8807⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:3176
-
-
-
C:\ProgramData\190079.exe"C:\ProgramData\190079.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2864 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1988
-
-
-
C:\ProgramData\2284054.exe"C:\ProgramData\2284054.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\ProgramData\7142836.exe"C:\ProgramData\7142836.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\ProgramData\4058250.exe"C:\ProgramData\4058250.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 18047⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:3340
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue118f55232e4.exe4⤵
- Loads dropped DLL
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue118f55232e4.exeTue118f55232e4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2976
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue112c483dd3245d.exe4⤵
- Loads dropped DLL
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\7zS0345F184\Tue112c483dd3245d.exeTue112c483dd3245d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 9766⤵
- Program crash
PID:3020
-
-
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2388
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2172
-