Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Analysis
-
max time kernel
1808s -
max time network
1811s -
platform
windows7_x64 -
resource
win7-fr -
submitted
12-09-2021 07:11
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
3.5MB
-
MD5
1b5154bc65145adba0a58e964265d5f2
-
SHA1
5a96fd55be61222b3e6438712979dc2a18a50b8c
-
SHA256
c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19
-
SHA512
9465da97b0986fef660e3f7725b4d4c034bef677acbe36382d95a8052c54634f004162aa3f105156e503af1b26632e47e44234ef9825b388260a6bcd310a5026
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-CtDpAM1g5f
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
pab123
45.14.49.169:22411
Signatures
-
Detected Djvu ransomware 2 IoCs
resource yara_rule behavioral2/memory/1168-360-0x0000000001810000-0x000000000192B000-memory.dmp family_djvu behavioral2/memory/1332-361-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 1012 rundll32.exe 54 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1012 rundll32.exe 54 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral2/memory/1468-185-0x0000000002EC0000-0x0000000002EDF000-memory.dmp family_redline behavioral2/memory/1468-192-0x00000000031F0000-0x000000000320E000-memory.dmp family_redline behavioral2/memory/2124-312-0x000000000041C5EE-mapping.dmp family_redline behavioral2/memory/2836-354-0x00000000003D0000-0x00000000003E8000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral2/files/0x0001000000012f1d-105.dat family_socelars behavioral2/files/0x0001000000012f1d-143.dat family_socelars behavioral2/files/0x0001000000012f1d-123.dat family_socelars -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/704-183-0x0000000000400000-0x00000000017F2000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0002000000012f0a-72.dat aspack_v212_v242 behavioral2/files/0x0002000000012f0a-71.dat aspack_v212_v242 behavioral2/files/0x0001000000012f10-70.dat aspack_v212_v242 behavioral2/files/0x0001000000012f10-69.dat aspack_v212_v242 behavioral2/files/0x0001000000012f12-75.dat aspack_v212_v242 behavioral2/files/0x0001000000012f12-76.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 63 IoCs
pid Process 1788 setup_installer.exe 1572 setup_install.exe 944 Sun05640630a6aa.exe 748 Sun059375dac544fc4a.exe 1468 Sun052bbd8bebd9.exe 680 Sun05d60bc3b96248e5.exe 704 Sun05ac1b0207d3ff3b8.exe 2012 Sun05899db881f67fb29.exe 1592 Sun05532f7abc.exe 1836 Sun05fa3b4d2ae56e.exe 1320 Sun050462125c7d35.exe 2440 LzmwAqmV.exe 2492 Chrome 5.exe 2508 PublicDwlBrowser1100.exe 2564 1382919.exe 2716 6825066.exe 2808 5813840.exe 2876 1571294.exe 2580 2.exe 1644 WinHoster.exe 2988 setup.exe 1420 udptest.exe 1824 setup_2.exe 2044 6703130.exe 2188 3975581.exe 1732 908332.exe 332 setup_2.tmp 2448 4235683.exe 1740 3215890.exe 2416 setup_2.exe 2728 setup_2.tmp 2124 908332.exe 2332 3002.exe 2552 jhuuee.exe 2980 BearVpn 3.exe 2060 3002.exe 2040 62C8.exe 2324 8F26.exe 1168 B4EF.exe 1332 B4EF.exe 2216 F183.exe 2480 B4EF.exe 1460 B4EF.exe 2072 build2.exe 1712 build3.exe 1876 build2.exe 1888 build3.exe 2792 8089.exe 1236 BE64.exe 2828 mstsca.exe 1700 mstsca.exe 2716 mstsca.exe 2000 sfgegfc 1636 mstsca.exe 2396 mstsca.exe 1492 B4EF.exe 2616 mstsca.exe 1568 mstsca.exe 2544 B4EF.exe 984 sfgegfc 1576 B4EF.exe 2612 mstsca.exe 2424 mstsca.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UseDeny.raw => C:\Users\Admin\Pictures\UseDeny.raw.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\CopyUninstall.tiff => C:\Users\Admin\Pictures\CopyUninstall.tiff.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\InstallWrite.crw => C:\Users\Admin\Pictures\InstallWrite.crw.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\ProtectFind.raw => C:\Users\Admin\Pictures\ProtectFind.raw.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\EnableResolve.tiff => C:\Users\Admin\Pictures\EnableResolve.tiff.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\PushConvertFrom.raw => C:\Users\Admin\Pictures\PushConvertFrom.raw.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\UnregisterCompare.tif => C:\Users\Admin\Pictures\UnregisterCompare.tif.wiot B4EF.exe File renamed C:\Users\Admin\Pictures\CompleteGroup.png => C:\Users\Admin\Pictures\CompleteGroup.png.wiot B4EF.exe File opened for modification C:\Users\Admin\Pictures\CopyUninstall.tiff B4EF.exe File opened for modification C:\Users\Admin\Pictures\EnableResolve.tiff B4EF.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5813840.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5813840.exe -
Loads dropped DLL 64 IoCs
pid Process 1992 setup_x86_x64_install.exe 1788 setup_installer.exe 1788 setup_installer.exe 1788 setup_installer.exe 1788 setup_installer.exe 1788 setup_installer.exe 1788 setup_installer.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 1572 setup_install.exe 904 cmd.exe 1972 cmd.exe 796 cmd.exe 1812 cmd.exe 556 cmd.exe 1812 cmd.exe 796 cmd.exe 1080 cmd.exe 1080 cmd.exe 668 cmd.exe 572 cmd.exe 944 Sun05640630a6aa.exe 944 Sun05640630a6aa.exe 1468 Sun052bbd8bebd9.exe 1468 Sun052bbd8bebd9.exe 1656 cmd.exe 1656 cmd.exe 704 Sun05ac1b0207d3ff3b8.exe 704 Sun05ac1b0207d3ff3b8.exe 1836 Sun05fa3b4d2ae56e.exe 1836 Sun05fa3b4d2ae56e.exe 1592 Sun05532f7abc.exe 1592 Sun05532f7abc.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 680 Sun05d60bc3b96248e5.exe 680 Sun05d60bc3b96248e5.exe 2440 LzmwAqmV.exe 2440 LzmwAqmV.exe 704 Sun05ac1b0207d3ff3b8.exe 704 Sun05ac1b0207d3ff3b8.exe 704 Sun05ac1b0207d3ff3b8.exe 704 Sun05ac1b0207d3ff3b8.exe 2440 LzmwAqmV.exe 2440 LzmwAqmV.exe 2440 LzmwAqmV.exe 2716 6825066.exe 2716 6825066.exe 2808 5813840.exe 2808 5813840.exe 2876 1571294.exe 2876 1571294.exe 2440 LzmwAqmV.exe 2716 6825066.exe 2440 LzmwAqmV.exe 2440 LzmwAqmV.exe 1644 WinHoster.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 904 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2808-241-0x0000000000DF0000-0x0000000000DF1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6825066.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6c5042f6-6727-4c42-afc7-7e093e0e772b\\B4EF.exe\" --AutoStart" B4EF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8089.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5813840.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com 108 api.2ip.ua 110 api.2ip.ua 126 api.2ip.ua 163 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2808 5813840.exe 2792 8089.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 1732 set thread context of 2124 1732 908332.exe 90 PID 1168 set thread context of 1332 1168 B4EF.exe 116 PID 2480 set thread context of 1460 2480 B4EF.exe 120 PID 2072 set thread context of 1876 2072 build2.exe 123 PID 1712 set thread context of 1888 1712 build3.exe 124 PID 2828 set thread context of 1700 2828 mstsca.exe 138 PID 2716 set thread context of 1636 2716 mstsca.exe 145 PID 2396 set thread context of 2616 2396 mstsca.exe 149 PID 1492 set thread context of 2544 1492 B4EF.exe 151 PID 1568 set thread context of 2612 1568 mstsca.exe 155 PID 2424 set thread context of 2484 2424 mstsca.exe 157 PID 1576 set thread context of 1956 1576 B4EF.exe 158 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-0BH58.tmp setup_2.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 2236 680 WerFault.exe 47 2624 2580 WerFault.exe 66 2428 1732 WerFault.exe 84 2108 2564 WerFault.exe 65 2940 2044 WerFault.exe 79 2152 2876 WerFault.exe 73 2836 1740 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sfgegfc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sfgegfc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun05532f7abc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun05532f7abc.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun05532f7abc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sfgegfc -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sun05ac1b0207d3ff3b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sun05ac1b0207d3ff3b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1068 schtasks.exe 2952 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2088 timeout.exe 2800 timeout.exe 2096 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 2224 taskkill.exe 2156 taskkill.exe 2916 taskkill.exe 2740 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun05d60bc3b96248e5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun05d60bc3b96248e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun05ac1b0207d3ff3b8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun05ac1b0207d3ff3b8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun05ac1b0207d3ff3b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Sun05d60bc3b96248e5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Sun05d60bc3b96248e5.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 69 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 Sun05532f7abc.exe 1592 Sun05532f7abc.exe 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1780 powershell.exe 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
pid Process 1240 Process not Found 2236 WerFault.exe 2428 WerFault.exe 2624 WerFault.exe 2108 WerFault.exe 2940 WerFault.exe 2152 WerFault.exe 2836 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1592 Sun05532f7abc.exe 2000 sfgegfc -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2156 taskkill.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 748 Sun059375dac544fc4a.exe Token: SeDebugPrivilege 1320 Sun050462125c7d35.exe Token: SeCreateTokenPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeAssignPrimaryTokenPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeLockMemoryPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeIncreaseQuotaPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeMachineAccountPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeTcbPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeSecurityPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeTakeOwnershipPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeLoadDriverPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeSystemProfilePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeSystemtimePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeProfSingleProcessPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeIncBasePriorityPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeCreatePagefilePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeCreatePermanentPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeBackupPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeRestorePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeShutdownPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeDebugPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeAuditPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeSystemEnvironmentPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeChangeNotifyPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeRemoteShutdownPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeUndockPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeSyncAgentPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeEnableDelegationPrivilege 680 Sun05d60bc3b96248e5.exe Token: SeManageVolumePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeImpersonatePrivilege 680 Sun05d60bc3b96248e5.exe Token: SeCreateGlobalPrivilege 680 Sun05d60bc3b96248e5.exe Token: 31 680 Sun05d60bc3b96248e5.exe Token: 32 680 Sun05d60bc3b96248e5.exe Token: 33 680 Sun05d60bc3b96248e5.exe Token: 34 680 Sun05d60bc3b96248e5.exe Token: 35 680 Sun05d60bc3b96248e5.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 2508 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 2564 1382919.exe Token: SeDebugPrivilege 2580 2.exe Token: SeDebugPrivilege 2876 1571294.exe Token: SeDebugPrivilege 2916 taskkill.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 2044 6703130.exe Token: SeDebugPrivilege 1468 Sun052bbd8bebd9.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 1740 3215890.exe Token: SeDebugPrivilege 2808 5813840.exe Token: SeDebugPrivilege 2236 WerFault.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 1732 908332.exe Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeShutdownPrivilege 1240 Process not Found Token: SeDebugPrivilege 2124 908332.exe Token: SeShutdownPrivilege 1240 Process not Found -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 2728 setup_2.tmp 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1992 wrote to memory of 1788 1992 setup_x86_x64_install.exe 26 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1788 wrote to memory of 1572 1788 setup_installer.exe 27 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1060 1572 setup_install.exe 29 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 1812 1572 setup_install.exe 30 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 796 1572 setup_install.exe 31 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1080 1572 setup_install.exe 32 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 1972 1572 setup_install.exe 33 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 904 1572 setup_install.exe 34 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 556 1572 setup_install.exe 35 PID 1572 wrote to memory of 572 1572 setup_install.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05ac1b0207d3ff3b8.exe4⤵
- Loads dropped DLL
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05ac1b0207d3ff3b8.exeSun05ac1b0207d3ff3b8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Sun05ac1b0207d3ff3b8.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05ac1b0207d3ff3b8.exe" & del C:\ProgramData\*.dll & exit6⤵PID:2836
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Sun05ac1b0207d3ff3b8.exe /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:2088
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun052bbd8bebd9.exe4⤵
- Loads dropped DLL
PID:796 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun052bbd8bebd9.exeSun052bbd8bebd9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05532f7abc.exe4⤵
- Loads dropped DLL
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05532f7abc.exeSun05532f7abc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05640630a6aa.exe4⤵
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05640630a6aa.exeSun05640630a6aa.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun059375dac544fc4a.exe4⤵
- Loads dropped DLL
PID:904 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun059375dac544fc4a.exeSun059375dac544fc4a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\ProgramData\6703130.exe"C:\ProgramData\6703130.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2044 -s 17329⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2940
-
-
-
C:\ProgramData\3975581.exe"C:\ProgramData\3975581.exe"8⤵
- Executes dropped EXE
PID:2188
-
-
C:\ProgramData\908332.exe"C:\ProgramData\908332.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\ProgramData\908332.exe"C:\ProgramData\908332.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 7129⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2428
-
-
-
C:\ProgramData\4235683.exe"C:\ProgramData\4235683.exe"8⤵
- Executes dropped EXE
PID:2448
-
-
C:\ProgramData\3215890.exe"C:\ProgramData\3215890.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 16929⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 13728⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:2368
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:2740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\is-8VLUS.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-8VLUS.tmp\setup_2.tmp" /SL5="$20174,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
PID:332 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\is-C298I.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-C298I.tmp\setup_2.tmp" /SL5="$20196,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
PID:2980
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05d60bc3b96248e5.exe4⤵
- Loads dropped DLL
PID:556 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05d60bc3b96248e5.exeSun05d60bc3b96248e5.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:680 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 7566⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun050462125c7d35.exe4⤵
- Loads dropped DLL
PID:572 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun050462125c7d35.exeSun050462125c7d35.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\ProgramData\1382919.exe"C:\ProgramData\1382919.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2564 -s 17407⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2108
-
-
-
C:\ProgramData\6825066.exe"C:\ProgramData\6825066.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2716 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644
-
-
-
C:\ProgramData\5813840.exe"C:\ProgramData\5813840.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\ProgramData\1571294.exe"C:\ProgramData\1571294.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 17127⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2152
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05899db881f67fb29.exe4⤵
- Loads dropped DLL
PID:668 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05899db881f67fb29.exeSun05899db881f67fb29.exe5⤵
- Executes dropped EXE
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun054fe19a12cb3.exe4⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun05fa3b4d2ae56e.exe /mixone4⤵
- Loads dropped DLL
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05fa3b4d2ae56e.exeSun05fa3b4d2ae56e.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun05fa3b4d2ae56e.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCF6C2934\Sun05fa3b4d2ae56e.exe" & exit6⤵PID:2088
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun05fa3b4d2ae56e.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2128
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\62C8.exeC:\Users\Admin\AppData\Local\Temp\62C8.exe1⤵
- Executes dropped EXE
PID:2040
-
C:\Users\Admin\AppData\Local\Temp\8F26.exeC:\Users\Admin\AppData\Local\Temp\8F26.exe1⤵
- Executes dropped EXE
PID:2324
-
C:\Users\Admin\AppData\Local\Temp\B4EF.exeC:\Users\Admin\AppData\Local\Temp\B4EF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\B4EF.exeC:\Users\Admin\AppData\Local\Temp\B4EF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1332 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\B4EF.exe"C:\Users\Admin\AppData\Local\Temp\B4EF.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\B4EF.exe"C:\Users\Admin\AppData\Local\Temp\B4EF.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:1460 -
C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build2.exe"C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2072 -
C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build2.exe"C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build2.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:848
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:2224
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:2800
-
-
-
-
-
C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build3.exe"C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build3.exe"C:\Users\Admin\AppData\Local\fa608329-eb79-452b-8ae5-91b7eff8cdde\build3.exe"6⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:1068
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F183.exeC:\Users\Admin\AppData\Local\Temp\F183.exe1⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\F183.exe"2⤵PID:2696
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\8089.exeC:\Users\Admin\AppData\Local\Temp\8089.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2792
-
C:\Users\Admin\AppData\Local\Temp\BE64.exeC:\Users\Admin\AppData\Local\Temp\BE64.exe1⤵
- Executes dropped EXE
PID:1236
-
C:\Windows\system32\taskeng.exetaskeng.exe {78AD5874-6B5D-49EA-8456-0FAE241BD062} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]1⤵PID:2444
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2828 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:2952
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:1636
-
-
-
C:\Users\Admin\AppData\Roaming\sfgegfcC:\Users\Admin\AppData\Roaming\sfgegfc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exeC:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exe --Task2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exeC:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exe --Task3⤵
- Executes dropped EXE
PID:2544
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2612
-
-
-
C:\Users\Admin\AppData\Roaming\sfgegfcC:\Users\Admin\AppData\Roaming\sfgegfc2⤵
- Executes dropped EXE
PID:984
-
-
C:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exeC:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exe --Task2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1576 -
C:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exeC:\Users\Admin\AppData\Local\6c5042f6-6727-4c42-afc7-7e093e0e772b\B4EF.exe --Task3⤵PID:1956
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2424 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:2484
-
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1