Overview
overview
10Static
static
022e3c30a1...66.exe
windows7_x64
10022e3c30a1...66.exe
windows11_x64
10022e3c30a1...66.exe
windows10_x64
104d27dca0a1...ef.exe
windows7_x64
104d27dca0a1...ef.exe
windows11_x64
104d27dca0a1...ef.exe
windows10_x64
10578a3a7a2b...b3.exe
windows7_x64
10578a3a7a2b...b3.exe
windows11_x64
10578a3a7a2b...b3.exe
windows10_x64
109c4880a98c...82.exe
windows7_x64
109c4880a98c...82.exe
windows11_x64
109c4880a98c...82.exe
windows10_x64
10a1dad4a83d...c4.exe
windows7_x64
10a1dad4a83d...c4.exe
windows11_x64
10a1dad4a83d...c4.exe
windows10_x64
10acf1b7d80f...e0.exe
windows7_x64
10acf1b7d80f...e0.exe
windows11_x64
10acf1b7d80f...e0.exe
windows10_x64
10cbf31d825a...d2.exe
windows7_x64
10cbf31d825a...d2.exe
windows11_x64
10cbf31d825a...d2.exe
windows10_x64
10db76a117db...12.exe
windows7_x64
10db76a117db...12.exe
windows11_x64
10db76a117db...12.exe
windows10_x64
10e2ffb8aeeb...f6.exe
windows7_x64
10e2ffb8aeeb...f6.exe
windows11_x64
10e2ffb8aeeb...f6.exe
windows10_x64
10f2196668f4...cb.exe
windows7_x64
10f2196668f4...cb.exe
windows11_x64
10f2196668f4...cb.exe
windows10_x64
10Resubmissions
10/11/2021, 14:50
211110-r7nbvaeddr 1008/11/2021, 16:12
211108-tnmmbahgaj 1008/11/2021, 15:26
211108-svdsbaccf6 1008/11/2021, 14:48
211108-r6lfvshdfn 10Analysis
-
max time kernel
42s -
max time network
182s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
10/11/2021, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win11
Behavioral task
behavioral3
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win10-en-20211014
Behavioral task
behavioral4
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win7-en-20211104
Behavioral task
behavioral5
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win11
Behavioral task
behavioral6
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win11
Behavioral task
behavioral9
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win10-en-20211104
Behavioral task
behavioral10
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win7-en-20211014
Behavioral task
behavioral11
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win11
Behavioral task
behavioral12
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win10-en-20211014
Behavioral task
behavioral13
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win7-en-20211104
Behavioral task
behavioral14
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win11
Behavioral task
behavioral15
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win10-en-20211014
Behavioral task
behavioral16
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win7-en-20211104
Behavioral task
behavioral17
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win11
Behavioral task
behavioral18
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win10-en-20211014
Behavioral task
behavioral19
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win7-en-20211014
Behavioral task
behavioral20
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win11
Behavioral task
behavioral21
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win10-en-20211014
Behavioral task
behavioral22
Sample
db76a117dba6c24a64f328418c742a46b987d3b0914564ea439d468aa422aa12.exe
Resource
win7-en-20211104
Behavioral task
behavioral23
Sample
db76a117dba6c24a64f328418c742a46b987d3b0914564ea439d468aa422aa12.exe
Resource
win11
Behavioral task
behavioral24
Sample
db76a117dba6c24a64f328418c742a46b987d3b0914564ea439d468aa422aa12.exe
Resource
win10-en-20211104
Behavioral task
behavioral25
Sample
e2ffb8aeeb869fbb3de97b95b0c5c9cf2234d85612ba111115a938c89e4d94f6.exe
Resource
win7-en-20211014
Behavioral task
behavioral26
Sample
e2ffb8aeeb869fbb3de97b95b0c5c9cf2234d85612ba111115a938c89e4d94f6.exe
Resource
win11
Behavioral task
behavioral27
Sample
e2ffb8aeeb869fbb3de97b95b0c5c9cf2234d85612ba111115a938c89e4d94f6.exe
Resource
win10-en-20211104
Behavioral task
behavioral28
Sample
f2196668f412d730bc6bd24f08b749ed411d3450f9b4af846fc759e249f72acb.exe
Resource
win7-en-20211014
Behavioral task
behavioral29
Sample
f2196668f412d730bc6bd24f08b749ed411d3450f9b4af846fc759e249f72acb.exe
Resource
win11
Behavioral task
behavioral30
Sample
f2196668f412d730bc6bd24f08b749ed411d3450f9b4af846fc759e249f72acb.exe
Resource
win10-en-20211104
General
-
Target
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
-
Size
3.6MB
-
MD5
9725f7f222530388cb2743504a6e0667
-
SHA1
56d0eb91855e326b050c904147f4d9dafc596d70
-
SHA256
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782
-
SHA512
ea5aedb3c3ab725c9afc65481ef7b59cdfad80613aaf43a8e76ec94045824269b008007644cb7943e65e98a87650f7f980afcd66ae1dee7807d84be57c018663
Malware Config
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
redline
fucker2
135.181.129.119:4805
Extracted
redline
media20
91.121.67.60:2151
Extracted
redline
Chris
194.104.136.5:46013
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 4340 rundll32.exe 121 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral12/memory/4156-306-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral12/memory/4176-307-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral12/memory/4200-313-0x000000000041B242-mapping.dmp family_redline behavioral12/memory/4176-311-0x000000000041B23E-mapping.dmp family_redline behavioral12/memory/4156-310-0x000000000041B23E-mapping.dmp family_redline behavioral12/memory/4200-309-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
resource yara_rule behavioral12/files/0x000500000001abb9-126.dat aspack_v212_v242 behavioral12/files/0x000500000001abb9-127.dat aspack_v212_v242 behavioral12/files/0x000600000001abcb-125.dat aspack_v212_v242 behavioral12/files/0x000700000001abcd-133.dat aspack_v212_v242 behavioral12/files/0x000700000001abcd-132.dat aspack_v212_v242 behavioral12/files/0x000600000001abcb-131.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
pid Process 3680 setup_installer.exe 1104 setup_install.exe 2060 Wed12fb2a5c52f05816.exe 1072 Wed128c2773227671b3f.exe 1260 Wed120b6f5c6d562.exe 1736 Wed1217e6a0ef74ed.exe 2244 Wed12bcd18bdbc441.exe 2200 Wed12fbb08f1dfc28.exe 2192 Wed12859e3c1cf63b6a0.exe 868 Wed126ca6605dbec0399.exe 1660 Wed129eb9b8859.exe 1996 Wed12ebaf7883e1890d.exe 1472 Wed1229427acd4bc167.exe 2080 Wed1241cc206cfb.exe 2744 Wed121f7e9e92793cf.exe 2096 Wed120b6f5c6d562.tmp -
Loads dropped DLL 5 IoCs
pid Process 1104 setup_install.exe 1104 setup_install.exe 1104 setup_install.exe 1104 setup_install.exe 1104 setup_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com 32 ipinfo.io 33 ipinfo.io 39 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3816 868 WerFault.exe 88 3812 1104 WerFault.exe 69 1172 868 WerFault.exe 88 4288 868 WerFault.exe 88 4484 868 WerFault.exe 88 4848 868 WerFault.exe 88 4972 4176 WerFault.exe 113 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed12fbb08f1dfc28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed12fbb08f1dfc28.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed12fbb08f1dfc28.exe -
Kills process with taskkill 1 IoCs
pid Process 4984 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 Wed12fbb08f1dfc28.exe 2200 Wed12fbb08f1dfc28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 Wed12ebaf7883e1890d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 3680 1000 9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe 68 PID 1000 wrote to memory of 3680 1000 9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe 68 PID 1000 wrote to memory of 3680 1000 9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe 68 PID 3680 wrote to memory of 1104 3680 setup_installer.exe 69 PID 3680 wrote to memory of 1104 3680 setup_installer.exe 69 PID 3680 wrote to memory of 1104 3680 setup_installer.exe 69 PID 1104 wrote to memory of 3956 1104 setup_install.exe 72 PID 1104 wrote to memory of 3956 1104 setup_install.exe 72 PID 1104 wrote to memory of 3956 1104 setup_install.exe 72 PID 1104 wrote to memory of 1836 1104 setup_install.exe 73 PID 1104 wrote to memory of 1836 1104 setup_install.exe 73 PID 1104 wrote to memory of 1836 1104 setup_install.exe 73 PID 1104 wrote to memory of 1496 1104 setup_install.exe 74 PID 1104 wrote to memory of 1496 1104 setup_install.exe 74 PID 1104 wrote to memory of 1496 1104 setup_install.exe 74 PID 1104 wrote to memory of 2220 1104 setup_install.exe 76 PID 1104 wrote to memory of 2220 1104 setup_install.exe 76 PID 1104 wrote to memory of 2220 1104 setup_install.exe 76 PID 1104 wrote to memory of 3848 1104 setup_install.exe 75 PID 1104 wrote to memory of 3848 1104 setup_install.exe 75 PID 1104 wrote to memory of 3848 1104 setup_install.exe 75 PID 1104 wrote to memory of 644 1104 setup_install.exe 77 PID 1104 wrote to memory of 644 1104 setup_install.exe 77 PID 1104 wrote to memory of 644 1104 setup_install.exe 77 PID 1104 wrote to memory of 860 1104 setup_install.exe 78 PID 1104 wrote to memory of 860 1104 setup_install.exe 78 PID 1104 wrote to memory of 860 1104 setup_install.exe 78 PID 1104 wrote to memory of 1316 1104 setup_install.exe 79 PID 1104 wrote to memory of 1316 1104 setup_install.exe 79 PID 1104 wrote to memory of 1316 1104 setup_install.exe 79 PID 1104 wrote to memory of 2836 1104 setup_install.exe 93 PID 1104 wrote to memory of 2836 1104 setup_install.exe 93 PID 1104 wrote to memory of 2836 1104 setup_install.exe 93 PID 1836 wrote to memory of 2052 1836 cmd.exe 92 PID 1836 wrote to memory of 2052 1836 cmd.exe 92 PID 1836 wrote to memory of 2052 1836 cmd.exe 92 PID 2220 wrote to memory of 2060 2220 cmd.exe 80 PID 2220 wrote to memory of 2060 2220 cmd.exe 80 PID 2220 wrote to memory of 2060 2220 cmd.exe 80 PID 1104 wrote to memory of 4072 1104 setup_install.exe 81 PID 1104 wrote to memory of 4072 1104 setup_install.exe 81 PID 1104 wrote to memory of 4072 1104 setup_install.exe 81 PID 1496 wrote to memory of 1072 1496 cmd.exe 82 PID 1496 wrote to memory of 1072 1496 cmd.exe 82 PID 1496 wrote to memory of 1072 1496 cmd.exe 82 PID 3956 wrote to memory of 2844 3956 cmd.exe 91 PID 3956 wrote to memory of 2844 3956 cmd.exe 91 PID 3956 wrote to memory of 2844 3956 cmd.exe 91 PID 1104 wrote to memory of 2248 1104 setup_install.exe 90 PID 1104 wrote to memory of 2248 1104 setup_install.exe 90 PID 1104 wrote to memory of 2248 1104 setup_install.exe 90 PID 1104 wrote to memory of 716 1104 setup_install.exe 83 PID 1104 wrote to memory of 716 1104 setup_install.exe 83 PID 1104 wrote to memory of 716 1104 setup_install.exe 83 PID 1104 wrote to memory of 700 1104 setup_install.exe 89 PID 1104 wrote to memory of 700 1104 setup_install.exe 89 PID 1104 wrote to memory of 700 1104 setup_install.exe 89 PID 860 wrote to memory of 1260 860 cmd.exe 84 PID 860 wrote to memory of 1260 860 cmd.exe 84 PID 860 wrote to memory of 1260 860 cmd.exe 84 PID 644 wrote to memory of 1736 644 cmd.exe 85 PID 644 wrote to memory of 1736 644 cmd.exe 85 PID 1104 wrote to memory of 1652 1104 setup_install.exe 87 PID 1104 wrote to memory of 1652 1104 setup_install.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe"C:\Users\Admin\AppData\Local\Temp\9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed128c2773227671b3f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed128c2773227671b3f.exeWed128c2773227671b3f.exe5⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed128c2773227671b3f.exeC:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed128c2773227671b3f.exe6⤵PID:4156
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed126ca6605dbec0399.exe /mixone4⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed126ca6605dbec0399.exeWed126ca6605dbec0399.exe /mixone5⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 6566⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 6726⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 6326⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 8126⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 8886⤵
- Program crash
PID:4848
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed12fb2a5c52f05816.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fb2a5c52f05816.exeWed12fb2a5c52f05816.exe5⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCripT:cLOSe ( creaTeoBJeCT( "wSCrIpT.shell").RuN ( "CMd.ExE /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fb2a5c52f05816.exe"" VAKlCUnlQu.exe && STArt VAkLCUnlqU.EXe -PRwIZKFgSE6xyUR7ivEyVbD3Oolfm & If """"=="""" for %E in ( ""C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fb2a5c52f05816.exe"") do taskkill -F -IM ""%~nxE"" " ,0, TRUe ) )6⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fb2a5c52f05816.exe" VAKlCUnlQu.exe&& STArt VAkLCUnlqU.EXe -PRwIZKFgSE6xyUR7ivEyVbD3Oolfm & If ""=="" for %E in ( "C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fb2a5c52f05816.exe") do taskkill -F -IM "%~nxE"7⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\VAKlCUnlQu.exeVAkLCUnlqU.EXe -PRwIZKFgSE6xyUR7ivEyVbD3Oolfm8⤵PID:4456
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCripT:cLOSe ( creaTeoBJeCT( "wSCrIpT.shell").RuN ( "CMd.ExE /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\VAKlCUnlQu.exe"" VAKlCUnlQu.exe && STArt VAkLCUnlqU.EXe -PRwIZKFgSE6xyUR7ivEyVbD3Oolfm & If ""-PRwIZKFgSE6xyUR7ivEyVbD3Oolfm ""=="""" for %E in ( ""C:\Users\Admin\AppData\Local\Temp\VAKlCUnlQu.exe"") do taskkill -F -IM ""%~nxE"" " ,0, TRUe ) )9⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\VAKlCUnlQu.exe" VAKlCUnlQu.exe&& STArt VAkLCUnlqU.EXe -PRwIZKFgSE6xyUR7ivEyVbD3Oolfm & If "-PRwIZKFgSE6xyUR7ivEyVbD3Oolfm "=="" for %E in ( "C:\Users\Admin\AppData\Local\Temp\VAKlCUnlQu.exe") do taskkill -F -IM "%~nxE"10⤵PID:4928
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -IM "Wed12fb2a5c52f05816.exe"8⤵
- Kills process with taskkill
PID:4984
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1217e6a0ef74ed.exe4⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed1217e6a0ef74ed.exeWed1217e6a0ef74ed.exe5⤵
- Executes dropped EXE
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed120b6f5c6d562.exe4⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed120b6f5c6d562.exeWed120b6f5c6d562.exe5⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\is-3IMMQ.tmp\Wed120b6f5c6d562.tmp"C:\Users\Admin\AppData\Local\Temp\is-3IMMQ.tmp\Wed120b6f5c6d562.tmp" /SL5="$401D8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed120b6f5c6d562.exe"6⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed120b6f5c6d562.exe"C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed120b6f5c6d562.exe" /SILENT7⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\is-J1BFJ.tmp\Wed120b6f5c6d562.tmp"C:\Users\Admin\AppData\Local\Temp\is-J1BFJ.tmp\Wed120b6f5c6d562.tmp" /SL5="$101E4,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed120b6f5c6d562.exe" /SILENT8⤵PID:372
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed12bcd18bdbc441.exe4⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12bcd18bdbc441.exeWed12bcd18bdbc441.exe5⤵
- Executes dropped EXE
PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1229427acd4bc167.exe4⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed1229427acd4bc167.exeWed1229427acd4bc167.exe5⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\Pictures\Adobe Films\TnmjnM1ZZm2MgyieVSmrSHYX.exe"C:\Users\Admin\Pictures\Adobe Films\TnmjnM1ZZm2MgyieVSmrSHYX.exe"6⤵PID:1764
-
-
C:\Users\Admin\Pictures\Adobe Films\gRA2QPPL5bpPzRaIWhdhT0UI.exe"C:\Users\Admin\Pictures\Adobe Films\gRA2QPPL5bpPzRaIWhdhT0UI.exe"6⤵PID:4548
-
-
C:\Users\Admin\Pictures\Adobe Films\qchZRw0j1VBg3_N1toSe8wYa.exe"C:\Users\Admin\Pictures\Adobe Films\qchZRw0j1VBg3_N1toSe8wYa.exe"6⤵PID:4464
-
-
C:\Users\Admin\Pictures\Adobe Films\r5ZFkfvKX4GEpQqtXNQdnIRg.exe"C:\Users\Admin\Pictures\Adobe Films\r5ZFkfvKX4GEpQqtXNQdnIRg.exe"6⤵PID:4288
-
-
C:\Users\Admin\Pictures\Adobe Films\U2O_VY0sbrEZFWDnhaJ1F_5Y.exe"C:\Users\Admin\Pictures\Adobe Films\U2O_VY0sbrEZFWDnhaJ1F_5Y.exe"6⤵PID:4304
-
-
C:\Users\Admin\Pictures\Adobe Films\QyRl9UKsiiriUEG_XzugMD_s.exe"C:\Users\Admin\Pictures\Adobe Films\QyRl9UKsiiriUEG_XzugMD_s.exe"6⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed129eb9b8859.exe4⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed129eb9b8859.exeWed129eb9b8859.exe5⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\Pictures\Adobe Films\ZtlV7tpecbKlN7ywkGtPrb5D.exe"C:\Users\Admin\Pictures\Adobe Films\ZtlV7tpecbKlN7ywkGtPrb5D.exe"6⤵PID:4208
-
-
C:\Users\Admin\Pictures\Adobe Films\mbqInIlXOIaJazETd9HaW_W1.exe"C:\Users\Admin\Pictures\Adobe Films\mbqInIlXOIaJazETd9HaW_W1.exe"6⤵PID:604
-
-
C:\Users\Admin\Pictures\Adobe Films\l0ZP07NhIxfatLy06iC1uBjn.exe"C:\Users\Admin\Pictures\Adobe Films\l0ZP07NhIxfatLy06iC1uBjn.exe"6⤵PID:4164
-
-
C:\Users\Admin\Pictures\Adobe Films\5JgyJlA5YFD9B6nqgwxKZFDH.exe"C:\Users\Admin\Pictures\Adobe Films\5JgyJlA5YFD9B6nqgwxKZFDH.exe"6⤵PID:4728
-
-
C:\Users\Admin\Pictures\Adobe Films\u9DUA5bFqGwkYggbJa5W0rAn.exe"C:\Users\Admin\Pictures\Adobe Films\u9DUA5bFqGwkYggbJa5W0rAn.exe"6⤵PID:3772
-
-
C:\Users\Admin\Pictures\Adobe Films\WXoVZfjE9GodwSBZtDveYi8G.exe"C:\Users\Admin\Pictures\Adobe Films\WXoVZfjE9GodwSBZtDveYi8G.exe"6⤵PID:4276
-
-
C:\Users\Admin\Pictures\Adobe Films\G6y730N_6A6Z8t8B07Mig0yI.exe"C:\Users\Admin\Pictures\Adobe Films\G6y730N_6A6Z8t8B07Mig0yI.exe"6⤵PID:5052
-
-
C:\Users\Admin\Pictures\Adobe Films\dQxhDLQ7XFdUlM0GQk5bMslv.exe"C:\Users\Admin\Pictures\Adobe Films\dQxhDLQ7XFdUlM0GQk5bMslv.exe"6⤵PID:5116
-
-
C:\Users\Admin\Pictures\Adobe Films\Ih3TYxGc9rvlILcahDsfEfYr.exe"C:\Users\Admin\Pictures\Adobe Films\Ih3TYxGc9rvlILcahDsfEfYr.exe"6⤵PID:348
-
-
C:\Users\Admin\Pictures\Adobe Films\hH6HTasH_I3qIDoHbPqhzjjg.exe"C:\Users\Admin\Pictures\Adobe Films\hH6HTasH_I3qIDoHbPqhzjjg.exe"6⤵PID:4772
-
-
C:\Users\Admin\Pictures\Adobe Films\9HXYm1apQxcDXoaS7Qh_WVHu.exe"C:\Users\Admin\Pictures\Adobe Films\9HXYm1apQxcDXoaS7Qh_WVHu.exe"6⤵PID:4812
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed121f7e9e92793cf.exe4⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed121f7e9e92793cf.exeWed121f7e9e92793cf.exe5⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed121f7e9e92793cf.exeC:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed121f7e9e92793cf.exe6⤵PID:4200
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1241cc206cfb.exe4⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed1241cc206cfb.exeWed1241cc206cfb.exe5⤵
- Executes dropped EXE
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed12ebaf7883e1890d.exe4⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12ebaf7883e1890d.exeWed12ebaf7883e1890d.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed12fbb08f1dfc28.exe4⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12fbb08f1dfc28.exeWed12fbb08f1dfc28.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed12859e3c1cf63b6a0.exe4⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12859e3c1cf63b6a0.exeWed12859e3c1cf63b6a0.exe5⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12859e3c1cf63b6a0.exeC:\Users\Admin\AppData\Local\Temp\7zS06EB9096\Wed12859e3c1cf63b6a0.exe6⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 247⤵
- Program crash
PID:4972
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 5004⤵
- Program crash
PID:3812
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4540
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4704