Analysis
-
max time kernel
579s -
max time network
560s -
platform
windows10_x64 -
resource
win10-en -
submitted
14-09-2021 09:06
Static task
static1
Behavioral task
behavioral1
Sample
lv.exe
Resource
win7-en
General
-
Target
lv.exe
-
Size
4.2MB
-
MD5
1919bd531e95d9195dc53ee6af79ffc8
-
SHA1
65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0
-
SHA256
eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27
-
SHA512
b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6
Malware Config
Extracted
danabot
2033
4
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
Signatures
-
Danabot Loader Component 6 IoCs
resource yara_rule behavioral2/files/0x000600000001ab35-155.dat DanabotLoader2021 behavioral2/files/0x000600000001ab35-157.dat DanabotLoader2021 behavioral2/files/0x000600000001ab35-156.dat DanabotLoader2021 behavioral2/memory/4584-158-0x0000000004000000-0x0000000004162000-memory.dmp DanabotLoader2021 behavioral2/files/0x000600000001ab35-165.dat DanabotLoader2021 behavioral2/files/0x000600000001ab35-181.dat DanabotLoader2021 -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 1056 created 4584 1056 WerFault.exe 90 PID 3796 created 2604 3796 WerFault.exe 98 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 11 IoCs
flow pid Process 29 4076 WScript.exe 31 4076 WScript.exe 33 4076 WScript.exe 35 4076 WScript.exe 42 4584 rundll32.exe 45 916 RUNDLL32.EXE 47 916 RUNDLL32.EXE 48 916 RUNDLL32.EXE 49 916 RUNDLL32.EXE 50 916 RUNDLL32.EXE 63 916 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 4572 wakingvp.exe 4596 fulzie.exe 4736 IntelRapid.exe 4828 Estremita.exe.com 4900 Estremita.exe.com 4960 ipconfig.exe 5052 ospybxlremjl.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fulzie.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fulzie.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk fulzie.exe -
Loads dropped DLL 6 IoCs
pid Process 4524 lv.exe 4572 wakingvp.exe 4584 rundll32.exe 4584 rundll32.exe 916 RUNDLL32.EXE 2604 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000500000001ab1a-119.dat themida behavioral2/files/0x000500000001ab1a-120.dat themida behavioral2/memory/4596-124-0x00007FF6B1AC0000-0x00007FF6B23D4000-memory.dmp themida behavioral2/files/0x000400000001ab21-128.dat themida behavioral2/files/0x000400000001ab21-129.dat themida behavioral2/memory/4736-132-0x00007FF636D00000-0x00007FF637614000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fulzie.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4596 fulzie.exe 4736 IntelRapid.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4900 set thread context of 4960 4900 Estremita.exe.com 79 PID 2604 set thread context of 4120 2604 RUNDLL32.EXE 99 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll lv.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll lv.exe File created C:\Program Files (x86)\foler\olader\acledit.dll lv.exe File created C:\PROGRA~3\Gskyj.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1056 4584 WerFault.exe 90 3796 2604 WerFault.exe 98 -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000500000001ab19-117.dat nsis_installer_1 behavioral2/files/0x000500000001ab19-117.dat nsis_installer_2 behavioral2/files/0x000500000001ab19-121.dat nsis_installer_1 behavioral2/files/0x000500000001ab19-121.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 43 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ipconfig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ipconfig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4960 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings ipconfig.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\691CA36A8E2B15F071FE2C968C4D0154C8D3E7B1 RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\691CA36A8E2B15F071FE2C968C4D0154C8D3E7B1\Blob = 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 RUNDLL32.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4856 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4736 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 916 RUNDLL32.EXE 916 RUNDLL32.EXE 916 RUNDLL32.EXE 916 RUNDLL32.EXE 916 RUNDLL32.EXE 916 RUNDLL32.EXE 2056 powershell.exe 2056 powershell.exe 2604 RUNDLL32.EXE 2604 RUNDLL32.EXE 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 3796 WerFault.exe 2056 powershell.exe 2628 powershell.exe 2628 powershell.exe 2628 powershell.exe 916 RUNDLL32.EXE 916 RUNDLL32.EXE 300 powershell.exe 300 powershell.exe 300 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4900 Estremita.exe.com -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 1056 WerFault.exe Token: SeBackupPrivilege 1056 WerFault.exe Token: SeDebugPrivilege 1056 WerFault.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 3796 WerFault.exe Token: SeDebugPrivilege 916 RUNDLL32.EXE Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 300 powershell.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4828 Estremita.exe.com 4828 Estremita.exe.com 4828 Estremita.exe.com 4900 Estremita.exe.com 4900 Estremita.exe.com 4900 Estremita.exe.com 4120 rundll32.exe 916 RUNDLL32.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4828 Estremita.exe.com 4828 Estremita.exe.com 4828 Estremita.exe.com 4900 Estremita.exe.com 4900 Estremita.exe.com 4900 Estremita.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4572 4524 lv.exe 69 PID 4524 wrote to memory of 4572 4524 lv.exe 69 PID 4524 wrote to memory of 4572 4524 lv.exe 69 PID 4524 wrote to memory of 4596 4524 lv.exe 70 PID 4524 wrote to memory of 4596 4524 lv.exe 70 PID 4572 wrote to memory of 4640 4572 wakingvp.exe 71 PID 4572 wrote to memory of 4640 4572 wakingvp.exe 71 PID 4572 wrote to memory of 4640 4572 wakingvp.exe 71 PID 4640 wrote to memory of 4696 4640 cmd.exe 73 PID 4640 wrote to memory of 4696 4640 cmd.exe 73 PID 4640 wrote to memory of 4696 4640 cmd.exe 73 PID 4596 wrote to memory of 4736 4596 fulzie.exe 74 PID 4596 wrote to memory of 4736 4596 fulzie.exe 74 PID 4696 wrote to memory of 4784 4696 cmd.exe 75 PID 4696 wrote to memory of 4784 4696 cmd.exe 75 PID 4696 wrote to memory of 4784 4696 cmd.exe 75 PID 4696 wrote to memory of 4828 4696 cmd.exe 76 PID 4696 wrote to memory of 4828 4696 cmd.exe 76 PID 4696 wrote to memory of 4828 4696 cmd.exe 76 PID 4696 wrote to memory of 4856 4696 cmd.exe 77 PID 4696 wrote to memory of 4856 4696 cmd.exe 77 PID 4696 wrote to memory of 4856 4696 cmd.exe 77 PID 4828 wrote to memory of 4900 4828 Estremita.exe.com 78 PID 4828 wrote to memory of 4900 4828 Estremita.exe.com 78 PID 4828 wrote to memory of 4900 4828 Estremita.exe.com 78 PID 4900 wrote to memory of 4960 4900 Estremita.exe.com 79 PID 4900 wrote to memory of 4960 4900 Estremita.exe.com 79 PID 4900 wrote to memory of 4960 4900 Estremita.exe.com 79 PID 4900 wrote to memory of 4960 4900 Estremita.exe.com 79 PID 4960 wrote to memory of 5052 4960 ipconfig.exe 80 PID 4960 wrote to memory of 5052 4960 ipconfig.exe 80 PID 4960 wrote to memory of 5052 4960 ipconfig.exe 80 PID 4960 wrote to memory of 5084 4960 ipconfig.exe 81 PID 4960 wrote to memory of 5084 4960 ipconfig.exe 81 PID 4960 wrote to memory of 5084 4960 ipconfig.exe 81 PID 4960 wrote to memory of 4076 4960 ipconfig.exe 84 PID 4960 wrote to memory of 4076 4960 ipconfig.exe 84 PID 4960 wrote to memory of 4076 4960 ipconfig.exe 84 PID 5052 wrote to memory of 4584 5052 ospybxlremjl.exe 90 PID 5052 wrote to memory of 4584 5052 ospybxlremjl.exe 90 PID 5052 wrote to memory of 4584 5052 ospybxlremjl.exe 90 PID 4584 wrote to memory of 916 4584 rundll32.exe 91 PID 4584 wrote to memory of 916 4584 rundll32.exe 91 PID 4584 wrote to memory of 916 4584 rundll32.exe 91 PID 916 wrote to memory of 2056 916 RUNDLL32.EXE 96 PID 916 wrote to memory of 2056 916 RUNDLL32.EXE 96 PID 916 wrote to memory of 2056 916 RUNDLL32.EXE 96 PID 916 wrote to memory of 2604 916 RUNDLL32.EXE 98 PID 916 wrote to memory of 2604 916 RUNDLL32.EXE 98 PID 916 wrote to memory of 2604 916 RUNDLL32.EXE 98 PID 2604 wrote to memory of 4120 2604 RUNDLL32.EXE 99 PID 2604 wrote to memory of 4120 2604 RUNDLL32.EXE 99 PID 2604 wrote to memory of 4120 2604 RUNDLL32.EXE 99 PID 4120 wrote to memory of 4868 4120 rundll32.exe 101 PID 4120 wrote to memory of 4868 4120 rundll32.exe 101 PID 916 wrote to memory of 2628 916 RUNDLL32.EXE 102 PID 916 wrote to memory of 2628 916 RUNDLL32.EXE 102 PID 916 wrote to memory of 2628 916 RUNDLL32.EXE 102 PID 916 wrote to memory of 300 916 RUNDLL32.EXE 105 PID 916 wrote to memory of 300 916 RUNDLL32.EXE 105 PID 916 wrote to memory of 300 916 RUNDLL32.EXE 105 PID 300 wrote to memory of 4836 300 powershell.exe 107 PID 300 wrote to memory of 4836 300 powershell.exe 107 PID 300 wrote to memory of 4836 300 powershell.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\lv.exe"C:\Users\Admin\AppData\Local\Temp\lv.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Giu.vst3⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^xUlNXJkiuCtOHCFKpjDKUUxBRFKQlgBZHHJmaqfsJHlshynlliqvvnNmAJWsYcXSwtiqTyaoWjqjKehMumFehtDoUpZItXagJafpYnsyOSmlnAPbcpkmPVEXBYyJy$" Ape.vst5⤵PID:4784
-
-
C:\Users\Admin\AppData\Roaming\Estremita.exe.comEstremita.exe.com o5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\Estremita.exe.comC:\Users\Admin\AppData\Roaming\Estremita.exe.com o6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\ipconfig.exeC:\Users\Admin\AppData\Roaming\ipconfig.exe7⤵
- Executes dropped EXE
- Checks processor information in registry
- Gathers network information
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\ospybxlremjl.exe"C:\Users\Admin\AppData\Local\Temp\ospybxlremjl.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\OSPYBX~1.DLL,s C:\Users\Admin\AppData\Local\Temp\OSPYBX~1.EXE9⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\OSPYBX~1.DLL,nj5g10⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\OSPYBX~1.DLL11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\OSPYBX~1.DLL,RxYwNGtZ11⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 1755412⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\ctfmon.exectfmon.exe13⤵PID:4868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 82412⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp2B6.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp193E.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost12⤵PID:4836
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask11⤵PID:5004
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask11⤵PID:4084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 78410⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dcmrydfiyx.vbs"8⤵PID:5084
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pmgktqonv.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4076
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping GSNTPAWQ5⤵
- Runs ping.exe
PID:4856
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:4736
-
-