Resubmissions

11-10-2021 20:45

211011-zjxjlsabbm 10

11-10-2021 13:10

211011-qegsxshcfp 10

11-10-2021 10:55

211011-mz7y3ahaak 10

10-10-2021 19:24

211010-x4mtssgae2 10

Analysis

  • max time kernel
    1812s
  • max time network
    1826s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    11-10-2021 10:55

General

  • Target

    setup_x86_x64_install.exe

  • Size

    3.9MB

  • MD5

    a4d23ac3c7172b9aa02e35b6bf0fd21f

  • SHA1

    0326aab7deddfefc048c9a67ac9ce4ee14ea9003

  • SHA256

    9bd142ecfe89857de80bb3255a1655f680ca6451b45cca235096dc1c1285e806

  • SHA512

    9e425d8a1beaeabfc983bb75a7a5f8a8c0823e825e9f66e17b0f515b2897da9f2d9b2f1aa9939fdbae6c826c2c730d3bc772abec9e35a61d3d73a6cdb87ddf10

Malware Config

Extracted

Family

redline

Botnet

ANI

C2

45.142.215.47:27643

Extracted

Family

smokeloader

Version

2020

C2

http://linavanandr11.club/

http://iselaharty12.club/

http://giovaninardo13.club/

http://zayneliann14.club/

http://zorinosali15.club/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 19 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE Zbot Generic URI/Header Struct .bin

    suricata: ET MALWARE Zbot Generic URI/Header Struct .bin

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 64 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 39 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 19 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 38 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\7zS06954724\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS06954724\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2112
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Sun152bab5a2de.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3468
          • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun152bab5a2de.exe
            Sun152bab5a2de.exe
            5⤵
            • Executes dropped EXE
            PID:5060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Sun15901f2f025e.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun15901f2f025e.exe
            Sun15901f2f025e.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 1632
              6⤵
              • Program crash
              • Checks processor information in registry
              • Enumerates system info in registry
              PID:3148
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Sun15dbd675f871ca.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:860
          • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun15dbd675f871ca.exe
            Sun15dbd675f871ca.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1452
            • C:\Users\Admin\Pictures\Adobe Films\zUlC2Q4BfVWeU1lU7qi8JezK.exe
              "C:\Users\Admin\Pictures\Adobe Films\zUlC2Q4BfVWeU1lU7qi8JezK.exe"
              6⤵
              • Executes dropped EXE
              PID:5156
            • C:\Users\Admin\Pictures\Adobe Films\luU0_5DplmXzND2h2sA9vflS.exe
              "C:\Users\Admin\Pictures\Adobe Films\luU0_5DplmXzND2h2sA9vflS.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:5624
              • C:\Users\Admin\Pictures\Adobe Films\luU0_5DplmXzND2h2sA9vflS.exe
                "C:\Users\Admin\Pictures\Adobe Films\luU0_5DplmXzND2h2sA9vflS.exe"
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:4328
            • C:\Users\Admin\Pictures\Adobe Films\9dp4_uPiS4Un9pmFmTxJ04Ij.exe
              "C:\Users\Admin\Pictures\Adobe Films\9dp4_uPiS4Un9pmFmTxJ04Ij.exe"
              6⤵
              • Executes dropped EXE
              PID:2188
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 236
                7⤵
                • Program crash
                • Checks processor information in registry
                • Enumerates system info in registry
                PID:4112
            • C:\Users\Admin\Pictures\Adobe Films\ytI6Pmp7bpxBzM2ePUadSNg0.exe
              "C:\Users\Admin\Pictures\Adobe Films\ytI6Pmp7bpxBzM2ePUadSNg0.exe"
              6⤵
              • Executes dropped EXE
              PID:5576
            • C:\Users\Admin\Pictures\Adobe Films\bbHEeUWIbx7KLCOvj8bIUZjE.exe
              "C:\Users\Admin\Pictures\Adobe Films\bbHEeUWIbx7KLCOvj8bIUZjE.exe"
              6⤵
              • Executes dropped EXE
              PID:5480
              • C:\ProgramData\build.exe
                "C:\ProgramData\build.exe"
                7⤵
                  PID:5720
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5720 -s 1704
                    8⤵
                    • Program crash
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    PID:832
              • C:\Users\Admin\Pictures\Adobe Films\oehnlVZnXu2z_DKRxUV6preg.exe
                "C:\Users\Admin\Pictures\Adobe Films\oehnlVZnXu2z_DKRxUV6preg.exe"
                6⤵
                • Executes dropped EXE
                PID:5476
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 276
                  7⤵
                  • Program crash
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  PID:5212
              • C:\Users\Admin\Pictures\Adobe Films\qmFIodO0jvQlbVpq3r2VqyDI.exe
                "C:\Users\Admin\Pictures\Adobe Films\qmFIodO0jvQlbVpq3r2VqyDI.exe"
                6⤵
                • Executes dropped EXE
                PID:856
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 296
                  7⤵
                  • Program crash
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  PID:2900
              • C:\Users\Admin\Pictures\Adobe Films\wUd40ruwE9QmwiLaM7Ay04NP.exe
                "C:\Users\Admin\Pictures\Adobe Films\wUd40ruwE9QmwiLaM7Ay04NP.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:5548
              • C:\Users\Admin\Pictures\Adobe Films\AwvbBpo0VVz5c8sULxb_cbno.exe
                "C:\Users\Admin\Pictures\Adobe Films\AwvbBpo0VVz5c8sULxb_cbno.exe"
                6⤵
                • Executes dropped EXE
                PID:5416
                • C:\Users\Admin\AppData\Roaming\1707690.scr
                  "C:\Users\Admin\AppData\Roaming\1707690.scr" /S
                  7⤵
                  • Executes dropped EXE
                  PID:5864
                • C:\Users\Admin\AppData\Roaming\1821053.scr
                  "C:\Users\Admin\AppData\Roaming\1821053.scr" /S
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: SetClipboardViewer
                  PID:4888
                • C:\Users\Admin\AppData\Roaming\4988956.scr
                  "C:\Users\Admin\AppData\Roaming\4988956.scr" /S
                  7⤵
                  • Executes dropped EXE
                  • Checks BIOS information in registry
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:1904
                • C:\Users\Admin\AppData\Roaming\5137688.scr
                  "C:\Users\Admin\AppData\Roaming\5137688.scr" /S
                  7⤵
                  • Executes dropped EXE
                  PID:1440
                • C:\Users\Admin\AppData\Roaming\1011117.scr
                  "C:\Users\Admin\AppData\Roaming\1011117.scr" /S
                  7⤵
                  • Executes dropped EXE
                  • Checks BIOS information in registry
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:5284
              • C:\Users\Admin\Pictures\Adobe Films\mwvoPHNJjiqvyCcvIch3ZVbY.exe
                "C:\Users\Admin\Pictures\Adobe Films\mwvoPHNJjiqvyCcvIch3ZVbY.exe"
                6⤵
                • Executes dropped EXE
                PID:5560
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 300
                  7⤵
                  • Program crash
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  PID:2160
              • C:\Users\Admin\Pictures\Adobe Films\3YbLemIoqe3uurTYdVcLylRr.exe
                "C:\Users\Admin\Pictures\Adobe Films\3YbLemIoqe3uurTYdVcLylRr.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                PID:4476
                • C:\Users\Admin\Pictures\Adobe Films\3YbLemIoqe3uurTYdVcLylRr.exe
                  "C:\Users\Admin\Pictures\Adobe Films\3YbLemIoqe3uurTYdVcLylRr.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:5488
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 1940
                  7⤵
                  • Program crash
                  PID:2848
              • C:\Users\Admin\Pictures\Adobe Films\3mlVFbxNQUHro2vr4i7_r39F.exe
                "C:\Users\Admin\Pictures\Adobe Films\3mlVFbxNQUHro2vr4i7_r39F.exe"
                6⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:5600
              • C:\Users\Admin\Pictures\Adobe Films\y24we7dqXEQFnqlu8heyrzOP.exe
                "C:\Users\Admin\Pictures\Adobe Films\y24we7dqXEQFnqlu8heyrzOP.exe"
                6⤵
                • Executes dropped EXE
                PID:5076
              • C:\Users\Admin\Pictures\Adobe Films\9QCLebCBwfOGsFtoeWcnmQ6L.exe
                "C:\Users\Admin\Pictures\Adobe Films\9QCLebCBwfOGsFtoeWcnmQ6L.exe"
                6⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:5568
              • C:\Users\Admin\Pictures\Adobe Films\YF7C2qE8B3IsroQPWR6hhwX4.exe
                "C:\Users\Admin\Pictures\Adobe Films\YF7C2qE8B3IsroQPWR6hhwX4.exe"
                6⤵
                • Executes dropped EXE
                PID:5620
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 280
                  7⤵
                  • Program crash
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  PID:2324
              • C:\Users\Admin\Pictures\Adobe Films\BJTgcaWBDihNFfYPZb3riUwD.exe
                "C:\Users\Admin\Pictures\Adobe Films\BJTgcaWBDihNFfYPZb3riUwD.exe"
                6⤵
                • Executes dropped EXE
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                PID:5668
                • C:\Users\Admin\AppData\Local\Temp\e739ee48-4b26-4abb-9801-20de28aeff73\AdvancedRun.exe
                  "C:\Users\Admin\AppData\Local\Temp\e739ee48-4b26-4abb-9801-20de28aeff73\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\e739ee48-4b26-4abb-9801-20de28aeff73\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
                  7⤵
                  • Executes dropped EXE
                  PID:2416
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e739ee48-4b26-4abb-9801-20de28aeff73\test.bat"
                    8⤵
                      PID:5520
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Pictures\Adobe Films\BJTgcaWBDihNFfYPZb3riUwD.exe" -Force
                    7⤵
                      PID:5152
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        8⤵
                        • Executes dropped EXE
                        PID:5720
                    • C:\Users\Admin\Pictures\Adobe Films\BJTgcaWBDihNFfYPZb3riUwD.exe
                      "C:\Users\Admin\Pictures\Adobe Films\BJTgcaWBDihNFfYPZb3riUwD.exe"
                      7⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Executes dropped EXE
                      PID:2400
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 5668 -s 2268
                      7⤵
                      • Program crash
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      PID:5024
                  • C:\Users\Admin\Pictures\Adobe Films\dhFhEMtMmMVBc81_f9AF5JGm.exe
                    "C:\Users\Admin\Pictures\Adobe Films\dhFhEMtMmMVBc81_f9AF5JGm.exe"
                    6⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    PID:5472
                    • C:\Program Files (x86)\Company\NewProduct\inst3.exe
                      "C:\Program Files (x86)\Company\NewProduct\inst3.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:1716
                    • C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe
                      "C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:2912
                    • C:\Program Files (x86)\Company\NewProduct\cm3.exe
                      "C:\Program Files (x86)\Company\NewProduct\cm3.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:5496
                  • C:\Users\Admin\Pictures\Adobe Films\wRI7TsmDln2jJ9rSQTbwnVME.exe
                    "C:\Users\Admin\Pictures\Adobe Films\wRI7TsmDln2jJ9rSQTbwnVME.exe"
                    6⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:4044
                  • C:\Users\Admin\Pictures\Adobe Films\_m0efJKN5GF8A2EmOOQo35rG.exe
                    "C:\Users\Admin\Pictures\Adobe Films\_m0efJKN5GF8A2EmOOQo35rG.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:5588
                    • C:\Users\Admin\Pictures\Adobe Films\_m0efJKN5GF8A2EmOOQo35rG.exe
                      "C:\Users\Admin\Pictures\Adobe Films\_m0efJKN5GF8A2EmOOQo35rG.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:1784
                  • C:\Users\Admin\Pictures\Adobe Films\4iPdEuZunDzyXSeMKj9mspGT.exe
                    "C:\Users\Admin\Pictures\Adobe Films\4iPdEuZunDzyXSeMKj9mspGT.exe"
                    6⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:4516
                  • C:\Users\Admin\Pictures\Adobe Films\OnnbJbZ5pchAYdaTwFNLHw36.exe
                    "C:\Users\Admin\Pictures\Adobe Films\OnnbJbZ5pchAYdaTwFNLHw36.exe"
                    6⤵
                    • Executes dropped EXE
                    • Drops startup file
                    PID:5544
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MjpFiZVjH.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MjpFiZVjH.exe"
                      7⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      PID:580
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                        8⤵
                          PID:3500
                        • C:\Windows\System32\netsh.exe
                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                          8⤵
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          PID:2848
                        • C:\Windows\System32\netsh.exe
                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                          8⤵
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          PID:5844
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                          8⤵
                          • Creates scheduled task(s)
                          PID:3924
                        • C:\Windows\System\svchost.exe
                          "C:\Windows\System\svchost.exe" formal
                          8⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:5596
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                            9⤵
                              PID:2936
                            • C:\Windows\System32\netsh.exe
                              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                              9⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5540
                            • C:\Windows\System32\netsh.exe
                              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                              9⤵
                                PID:796
                        • C:\Users\Admin\Pictures\Adobe Films\dOQLnTOvgy_UxBt03dThhTcG.exe
                          "C:\Users\Admin\Pictures\Adobe Films\dOQLnTOvgy_UxBt03dThhTcG.exe"
                          6⤵
                            PID:2428
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 268
                              7⤵
                              • Program crash
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              PID:5236
                          • C:\Users\Admin\Pictures\Adobe Films\YxsCDC7PCsMbrRxTLdpeSjPw.exe
                            "C:\Users\Admin\Pictures\Adobe Films\YxsCDC7PCsMbrRxTLdpeSjPw.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:5268
                          • C:\Users\Admin\Pictures\Adobe Films\NGsyXdVeWanAc0BteC5lTBNQ.exe
                            "C:\Users\Admin\Pictures\Adobe Films\NGsyXdVeWanAc0BteC5lTBNQ.exe"
                            6⤵
                            • Executes dropped EXE
                            • Checks BIOS information in registry
                            • Checks whether UAC is enabled
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5372
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Sun15f67075f27a2b5b.exe
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3636
                        • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun15f67075f27a2b5b.exe
                          Sun15f67075f27a2b5b.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4880
                          • C:\Users\Admin\AppData\Roaming\6703036.scr
                            "C:\Users\Admin\AppData\Roaming\6703036.scr" /S
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4172
                          • C:\Users\Admin\AppData\Roaming\2524259.scr
                            "C:\Users\Admin\AppData\Roaming\2524259.scr" /S
                            6⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:5064
                            • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                              "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                              7⤵
                              • Executes dropped EXE
                              PID:5920
                          • C:\Users\Admin\AppData\Roaming\3004754.scr
                            "C:\Users\Admin\AppData\Roaming\3004754.scr" /S
                            6⤵
                            • Executes dropped EXE
                            • Checks BIOS information in registry
                            • Checks whether UAC is enabled
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5780
                          • C:\Users\Admin\AppData\Roaming\5988557.scr
                            "C:\Users\Admin\AppData\Roaming\5988557.scr" /S
                            6⤵
                            • Executes dropped EXE
                            PID:5876
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Sun1577c3e159a3e3815.exe /mixone
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4712
                        • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun1577c3e159a3e3815.exe
                          Sun1577c3e159a3e3815.exe /mixone
                          5⤵
                          • Executes dropped EXE
                          PID:3180
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 292
                            6⤵
                            • Program crash
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:5136
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Sun15f1b1f8c669.exe
                        4⤵
                          PID:4696
                          • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun15f1b1f8c669.exe
                            Sun15f1b1f8c669.exe
                            5⤵
                            • Executes dropped EXE
                            PID:1436
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 324
                              6⤵
                              • Drops file in Windows directory
                              • Program crash
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2556
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c Sun159ff1acacf.exe
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4188
                          • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun159ff1acacf.exe
                            Sun159ff1acacf.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:2068
                            • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun159ff1acacf.exe
                              C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun159ff1acacf.exe
                              6⤵
                              • Executes dropped EXE
                              PID:2748
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c Sun152bea652bd7232.exe
                          4⤵
                            PID:3680
                            • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun152bea652bd7232.exe
                              Sun152bea652bd7232.exe
                              5⤵
                              • Executes dropped EXE
                              PID:4756
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Sun1507db358fce61c0b.exe
                            4⤵
                              PID:1696
                              • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun1507db358fce61c0b.exe
                                Sun1507db358fce61c0b.exe
                                5⤵
                                • Executes dropped EXE
                                PID:2600
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 280
                                  6⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:5300
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun158d8ef840.exe
                              4⤵
                                PID:4816
                                • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun158d8ef840.exe
                                  Sun158d8ef840.exe
                                  5⤵
                                  • Executes dropped EXE
                                  PID:4720
                                  • C:\Windows\SysWOW64\mshta.exe
                                    "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun158d8ef840.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun158d8ef840.exe"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                    6⤵
                                      PID:4708
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun158d8ef840.exe" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun158d8ef840.exe" ) do taskkill /F -Im "%~NxU"
                                        7⤵
                                          PID:752
                                          • C:\Users\Admin\AppData\Local\Temp\09xU.exE
                                            09xU.EXE -pPtzyIkqLZoCarb5ew
                                            8⤵
                                            • Executes dropped EXE
                                            PID:5312
                                            • C:\Windows\SysWOW64\mshta.exe
                                              "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                              9⤵
                                                PID:5468
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE" ) do taskkill /F -Im "%~NxU"
                                                  10⤵
                                                    PID:5716
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  "C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " , 0 ,TRuE ) )
                                                  9⤵
                                                    PID:1736
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I
                                                      10⤵
                                                        PID:4704
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" eCHO "
                                                          11⤵
                                                            PID:5408
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"
                                                            11⤵
                                                              PID:4524
                                                            • C:\Windows\SysWOW64\control.exe
                                                              control .\R6f7sE.I
                                                              11⤵
                                                                PID:664
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                  12⤵
                                                                  • Loads dropped DLL
                                                                  PID:5604
                                                                  • C:\Windows\system32\RunDll32.exe
                                                                    C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                    13⤵
                                                                      PID:1888
                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                        "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I
                                                                        14⤵
                                                                        • Loads dropped DLL
                                                                        PID:5452
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F -Im "Sun158d8ef840.exe"
                                                            8⤵
                                                            • Kills process with taskkill
                                                            PID:5540
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c Sun152e52d07b74d9b5.exe
                                                    4⤵
                                                      PID:2040
                                                      • C:\Users\Admin\AppData\Local\Temp\7zS06954724\Sun152e52d07b74d9b5.exe
                                                        Sun152e52d07b74d9b5.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2276
                                                        • C:\Windows\system32\WerFault.exe
                                                          C:\Windows\system32\WerFault.exe -u -p 2276 -s 1920
                                                          6⤵
                                                          • Program crash
                                                          • Checks processor information in registry
                                                          • Enumerates system info in registry
                                                          PID:5260
                                              • C:\Windows\System32\Upfc.exe
                                                C:\Windows\System32\Upfc.exe /launchtype periodic /cv vUTNTj+LSkG2KAeaWjURqw.0
                                                1⤵
                                                  PID:4804
                                                  • C:\Windows\System32\sihclient.exe
                                                    C:\Windows\System32\sihclient.exe /cv vUTNTj+LSkG2KAeaWjURqw.0.2
                                                    2⤵
                                                      PID:976
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                    1⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4628
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                    1⤵
                                                      PID:4652
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                      1⤵
                                                        PID:4216
                                                      • C:\Windows\System32\WaaSMedicAgent.exe
                                                        C:\Windows\System32\WaaSMedicAgent.exe 4d2677899b6d76182d6b82aa91be525d vUTNTj+LSkG2KAeaWjURqw.0.1.0.3.0
                                                        1⤵
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4948
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1848
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:1560
                                                        • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                                                          C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                                                          2⤵
                                                            PID:2064
                                                          • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                                                            C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                                                            2⤵
                                                              PID:4280
                                                          • C:\Windows\System32\WaaSMedicAgent.exe
                                                            C:\Windows\System32\WaaSMedicAgent.exe 4d2677899b6d76182d6b82aa91be525d vUTNTj+LSkG2KAeaWjURqw.0.1.0.3.0
                                                            1⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:4044
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1436 -ip 1436
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:2424
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3180 -ip 3180
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:1364
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -pss -s 524 -p 2276 -ip 2276
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:1888
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2600 -ip 2600
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:5208
                                                          • C:\Windows\system32\rundll32.exe
                                                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                            1⤵
                                                            • Process spawned unexpected child process
                                                            PID:5564
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                              2⤵
                                                              • Loads dropped DLL
                                                              PID:5616
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 456
                                                                3⤵
                                                                • Program crash
                                                                PID:5844
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5616 -ip 5616
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:5744
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1008 -ip 1008
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:5004
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2188 -ip 2188
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:1012
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 856 -ip 856
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:5860
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5720 -ip 5720
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:4244
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2428 -ip 2428
                                                            1⤵
                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                            PID:3428
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4476 -ip 4476
                                                            1⤵
                                                              PID:2400
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5476 -ip 5476
                                                              1⤵
                                                              • Suspicious use of NtCreateProcessExOtherParentProcess
                                                              PID:6004
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5620 -ip 5620
                                                              1⤵
                                                              • Suspicious use of NtCreateProcessExOtherParentProcess
                                                              PID:4052
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5560 -ip 5560
                                                              1⤵
                                                                PID:860
                                                              • C:\Users\Admin\AppData\Local\Temp\8BB6.exe
                                                                C:\Users\Admin\AppData\Local\Temp\8BB6.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                PID:3212
                                                                • C:\Users\Admin\AppData\Local\Temp\8BB6.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\8BB6.exe
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Checks SCSI registry key(s)
                                                                  • Suspicious behavior: MapViewOfSection
                                                                  PID:6020
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                                                                1⤵
                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                PID:6132
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5668 -ip 5668
                                                                1⤵
                                                                • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                • Executes dropped EXE
                                                                PID:2428
                                                              • C:\Users\Admin\AppData\Local\Temp\121E.exe
                                                                C:\Users\Admin\AppData\Local\Temp\121E.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:5368
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5368 -s 276
                                                                  2⤵
                                                                  • Program crash
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  PID:3524
                                                              • C:\Users\Admin\AppData\Local\Temp\23C2.exe
                                                                C:\Users\Admin\AppData\Local\Temp\23C2.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Checks BIOS information in registry
                                                                • Checks whether UAC is enabled
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:4072
                                                              • C:\Users\Admin\AppData\Local\Temp\35E4.exe
                                                                C:\Users\Admin\AppData\Local\Temp\35E4.exe
                                                                1⤵
                                                                  PID:3944
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 304
                                                                    2⤵
                                                                    • Program crash
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    PID:4804
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 5368 -ip 5368
                                                                  1⤵
                                                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                  PID:1236
                                                                • C:\Users\Admin\AppData\Local\Temp\5043.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\5043.exe
                                                                  1⤵
                                                                    PID:5400
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5400 -s 280
                                                                      2⤵
                                                                      • Program crash
                                                                      • Checks processor information in registry
                                                                      • Enumerates system info in registry
                                                                      PID:1284
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3944 -ip 3944
                                                                    1⤵
                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                    PID:1308
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 5400 -ip 5400
                                                                    1⤵
                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                    PID:5748
                                                                  • C:\Users\Admin\AppData\Local\Temp\AA6E.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\AA6E.exe
                                                                    1⤵
                                                                      PID:5340
                                                                      • C:\Windows\system32\WerFault.exe
                                                                        C:\Windows\system32\WerFault.exe -u -p 5340 -s 1824
                                                                        2⤵
                                                                        • Program crash
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        PID:3176
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -pss -s 408 -p 5340 -ip 5340
                                                                      1⤵
                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                      PID:1564

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v6

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • memory/856-511-0x0000000000680000-0x00000000006B0000-memory.dmp

                                                                      Filesize

                                                                      192KB

                                                                    • memory/932-180-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                      Filesize

                                                                      100KB

                                                                    • memory/932-174-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                      Filesize

                                                                      1.5MB

                                                                    • memory/932-169-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                      Filesize

                                                                      572KB

                                                                    • memory/932-170-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                      Filesize

                                                                      572KB

                                                                    • memory/932-171-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                      Filesize

                                                                      572KB

                                                                    • memory/932-173-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                      Filesize

                                                                      1.5MB

                                                                    • memory/932-175-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                      Filesize

                                                                      1.5MB

                                                                    • memory/932-176-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                      Filesize

                                                                      1.5MB

                                                                    • memory/932-177-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                      Filesize

                                                                      152KB

                                                                    • memory/932-181-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                      Filesize

                                                                      100KB

                                                                    • memory/932-178-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                      Filesize

                                                                      100KB

                                                                    • memory/932-179-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                      Filesize

                                                                      100KB

                                                                    • memory/1436-230-0x00000000017AD000-0x00000000017D0000-memory.dmp

                                                                      Filesize

                                                                      140KB

                                                                    • memory/1436-268-0x00000000032A0000-0x00000000032D0000-memory.dmp

                                                                      Filesize

                                                                      192KB

                                                                    • memory/1440-632-0x0000000005170000-0x0000000005171000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1452-262-0x0000000005B80000-0x0000000005CC3000-memory.dmp

                                                                      Filesize

                                                                      1.3MB

                                                                    • memory/1716-486-0x0000000000F80000-0x0000000000F90000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1716-507-0x0000000000FA0000-0x0000000000FB2000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/1784-629-0x0000000005000000-0x0000000005618000-memory.dmp

                                                                      Filesize

                                                                      6.1MB

                                                                    • memory/1848-151-0x0000027816650000-0x0000027816654000-memory.dmp

                                                                      Filesize

                                                                      16KB

                                                                    • memory/1904-623-0x0000000005BD0000-0x0000000005BD1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2068-233-0x0000000000030000-0x0000000000031000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2068-249-0x00000000023E0000-0x00000000023E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2068-254-0x0000000002390000-0x0000000002406000-memory.dmp

                                                                      Filesize

                                                                      472KB

                                                                    • memory/2068-245-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2068-256-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-388-0x000000007F8A0000-0x000000007F8A1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-244-0x0000000006FB0000-0x0000000006FB1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-257-0x0000000007CF0000-0x0000000007CF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-258-0x0000000007DD0000-0x0000000007DD1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-255-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-261-0x0000000008540000-0x0000000008541000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-274-0x0000000008510000-0x0000000008511000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-253-0x0000000007C20000-0x0000000007C21000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-280-0x00000000087E0000-0x00000000087E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-260-0x0000000008170000-0x0000000008171000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-251-0x0000000007480000-0x0000000007481000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-345-0x0000000006FB5000-0x0000000006FB7000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2112-246-0x0000000006FB2000-0x0000000006FB3000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-232-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-226-0x00000000030F0000-0x00000000030F1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-240-0x00000000075F0000-0x00000000075F1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2112-224-0x00000000030F0000-0x00000000030F1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2188-453-0x0000000003440000-0x0000000003516000-memory.dmp

                                                                      Filesize

                                                                      856KB

                                                                    • memory/2276-247-0x000000001BC10000-0x000000001BC12000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2276-238-0x0000000000F50000-0x0000000000F51000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2400-756-0x00000000059D0000-0x00000000059D1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2600-295-0x0000000003390000-0x0000000003399000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/2600-243-0x0000000001888000-0x0000000001899000-memory.dmp

                                                                      Filesize

                                                                      68KB

                                                                    • memory/2748-276-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2748-288-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2748-305-0x0000000004D90000-0x00000000053A8000-memory.dmp

                                                                      Filesize

                                                                      6.1MB

                                                                    • memory/2748-296-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2748-303-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2748-292-0x0000000004E30000-0x0000000004E31000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2748-298-0x0000000005070000-0x0000000005071000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2912-501-0x000000001BB80000-0x000000001BB82000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3180-223-0x00000000019C9000-0x00000000019F2000-memory.dmp

                                                                      Filesize

                                                                      164KB

                                                                    • memory/3180-270-0x0000000001900000-0x0000000001948000-memory.dmp

                                                                      Filesize

                                                                      288KB

                                                                    • memory/3232-470-0x0000000002E20000-0x0000000002E36000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/3232-751-0x0000000003040000-0x0000000003056000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/3500-771-0x0000026A61FE6000-0x0000026A61FE8000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3500-742-0x0000026A61FE3000-0x0000026A61FE5000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3500-739-0x0000026A61FE0000-0x0000026A61FE2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-617-0x0000000006440000-0x0000000006441000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4172-285-0x0000000000720000-0x0000000000721000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4172-316-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4172-300-0x00000000029B0000-0x00000000029B1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4172-306-0x00000000049D0000-0x0000000004A19000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/4328-454-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/4476-510-0x0000000004F60000-0x00000000051E6000-memory.dmp

                                                                      Filesize

                                                                      2.5MB

                                                                    • memory/4652-147-0x000002567B9C0000-0x000002567B9D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4652-146-0x000002567B770000-0x000002567B780000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4652-148-0x000002567BBF0000-0x000002567BBF4000-memory.dmp

                                                                      Filesize

                                                                      16KB

                                                                    • memory/4720-237-0x0000000003240000-0x0000000003241000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4720-241-0x0000000003240000-0x0000000003241000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4880-252-0x000000001BBB0000-0x000000001BBB2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4880-248-0x00000000015C0000-0x00000000015C1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4880-225-0x0000000000F00000-0x0000000000F01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4888-544-0x0000000005650000-0x0000000005651000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5064-282-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5064-297-0x00000000055E0000-0x00000000055E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5064-289-0x0000000004D60000-0x0000000004D6C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/5064-269-0x0000000000A90000-0x0000000000A91000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5064-301-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5076-496-0x0000000004D10000-0x0000000004F96000-memory.dmp

                                                                      Filesize

                                                                      2.5MB

                                                                    • memory/5152-711-0x0000000006940000-0x0000000006941000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5152-729-0x0000000006942000-0x0000000006943000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5268-519-0x0000000002AA2000-0x0000000002AA3000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5268-525-0x0000000002AA3000-0x0000000002AA4000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5268-539-0x0000000002AA4000-0x0000000002AA5000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5268-513-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5284-637-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5312-294-0x0000000000950000-0x0000000000951000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5312-291-0x0000000000950000-0x0000000000951000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5416-444-0x000000001B580000-0x000000001B582000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/5476-663-0x0000000002310000-0x000000000239E000-memory.dmp

                                                                      Filesize

                                                                      568KB

                                                                    • memory/5488-676-0x00000000053D0000-0x00000000059E8000-memory.dmp

                                                                      Filesize

                                                                      6.1MB

                                                                    • memory/5544-548-0x0000000002E80000-0x0000000002E81000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5560-670-0x00000000033C0000-0x00000000033F0000-memory.dmp

                                                                      Filesize

                                                                      192KB

                                                                    • memory/5568-596-0x0000000005EF0000-0x0000000005EF1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5576-414-0x0000000002A10000-0x0000000002A11000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5576-416-0x0000000002A13000-0x0000000002A14000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5576-427-0x0000000002A14000-0x0000000002A15000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5576-411-0x0000000002A12000-0x0000000002A13000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5588-505-0x0000000005470000-0x0000000005471000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5600-573-0x0000000005B00000-0x0000000005B01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5604-521-0x0000000005130000-0x00000000051DB000-memory.dmp

                                                                      Filesize

                                                                      684KB

                                                                    • memory/5604-516-0x0000000004FA0000-0x000000000507F000-memory.dmp

                                                                      Filesize

                                                                      892KB

                                                                    • memory/5620-665-0x0000000003490000-0x0000000003566000-memory.dmp

                                                                      Filesize

                                                                      856KB

                                                                    • memory/5624-452-0x0000000001820000-0x0000000001829000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/5668-491-0x0000000005650000-0x00000000058D6000-memory.dmp

                                                                      Filesize

                                                                      2.5MB

                                                                    • memory/5780-368-0x0000000005A40000-0x0000000005A41000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5864-552-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5876-408-0x00000000056E0000-0x00000000056E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5920-392-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                                                      Filesize

                                                                      4KB