Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
25-11-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe
Resource
win7-en-20211014
General
-
Target
1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe
-
Size
6.2MB
-
MD5
eaf0414732a32787b8c26e69af59bfa0
-
SHA1
e313935ac46f141a3940236026cfe0eb0f4a1dcc
-
SHA256
1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181
-
SHA512
cc9dda5d5072e3ef01ee3e61fe23d0e753ca5957ff9f15e49377bd84a0be5b1f3606aaca9e6cbc7ff6fb67cf130da2d2174c32c5a2e5911706acf6b085706ab1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1500 furm-extensions.exe 4112 sqtvvs.exe -
Loads dropped DLL 13 IoCs
pid Process 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 4224 MsiExec.exe 4224 MsiExec.exe 3172 MsiExec.exe 3172 MsiExec.exe 3172 MsiExec.exe 3172 MsiExec.exe 3172 MsiExec.exe 3172 MsiExec.exe 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 1500 furm-extensions.exe 4112 sqtvvs.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\J: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\M: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\I: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\Y: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\G: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\S: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\X: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\W: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{9A096DC8-65A7-4900-8F7C-79D764814FC9} msiexec.exe File created C:\Windows\Installer\f75da05.msi msiexec.exe File opened for modification C:\Windows\Installer\f75da05.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE5AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE727.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE812.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE8AF.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE699.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEA08.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF16C.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1260 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4052 msiexec.exe 4052 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4052 msiexec.exe Token: SeCreateTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeAssignPrimaryTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeLockMemoryPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeIncreaseQuotaPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeMachineAccountPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeTcbPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSecurityPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeTakeOwnershipPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeLoadDriverPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemProfilePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemtimePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeProfSingleProcessPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeIncBasePriorityPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreatePagefilePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreatePermanentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeBackupPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeRestorePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeShutdownPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeDebugPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeAuditPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemEnvironmentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeChangeNotifyPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeRemoteShutdownPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeUndockPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSyncAgentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeEnableDelegationPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeManageVolumePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeImpersonatePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreateGlobalPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreateTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeAssignPrimaryTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeLockMemoryPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeIncreaseQuotaPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeMachineAccountPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeTcbPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSecurityPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeTakeOwnershipPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeLoadDriverPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemProfilePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemtimePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeProfSingleProcessPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeIncBasePriorityPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreatePagefilePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreatePermanentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeBackupPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeRestorePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeShutdownPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeDebugPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeAuditPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSystemEnvironmentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeChangeNotifyPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeRemoteShutdownPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeUndockPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeSyncAgentPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeEnableDelegationPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeManageVolumePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeImpersonatePrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreateGlobalPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeCreateTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeAssignPrimaryTokenPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeLockMemoryPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeIncreaseQuotaPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe Token: SeMachineAccountPrivilege 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4500 msiexec.exe 4500 msiexec.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4224 4052 msiexec.exe 70 PID 4052 wrote to memory of 4224 4052 msiexec.exe 70 PID 4052 wrote to memory of 4224 4052 msiexec.exe 70 PID 3584 wrote to memory of 4500 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 71 PID 3584 wrote to memory of 4500 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 71 PID 3584 wrote to memory of 4500 3584 1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe 71 PID 4052 wrote to memory of 3172 4052 msiexec.exe 72 PID 4052 wrote to memory of 3172 4052 msiexec.exe 72 PID 4052 wrote to memory of 3172 4052 msiexec.exe 72 PID 4052 wrote to memory of 1500 4052 msiexec.exe 73 PID 4052 wrote to memory of 1500 4052 msiexec.exe 73 PID 4052 wrote to memory of 1500 4052 msiexec.exe 73 PID 1500 wrote to memory of 4112 1500 furm-extensions.exe 74 PID 1500 wrote to memory of 4112 1500 furm-extensions.exe 74 PID 1500 wrote to memory of 4112 1500 furm-extensions.exe 74 PID 4112 wrote to memory of 4928 4112 sqtvvs.exe 77 PID 4112 wrote to memory of 4928 4112 sqtvvs.exe 77 PID 4112 wrote to memory of 4928 4112 sqtvvs.exe 77 PID 4112 wrote to memory of 1260 4112 sqtvvs.exe 79 PID 4112 wrote to memory of 1260 4112 sqtvvs.exe 79 PID 4112 wrote to memory of 1260 4112 sqtvvs.exe 79 PID 4928 wrote to memory of 4636 4928 cmd.exe 81 PID 4928 wrote to memory of 4636 4928 cmd.exe 81 PID 4928 wrote to memory of 4636 4928 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe"C:\Users\Admin\AppData\Local\Temp\1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Geeks3D\Fur Images Converter 3.3.2.0\install\4814FC9\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1ae5c809ea8fabce9c699c87416d73ba5ab619accef6deeb26c2c38f39323181.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1637843788 " AI_EUIMSI=""2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4500
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4E1C5F7238505AC321338C04835037C1 C2⤵
- Loads dropped DLL
PID:4224
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9A1744254793EE07F856B13705C0340A2⤵
- Loads dropped DLL
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\furm-extensions.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\furm-extensions.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\5⤵PID:4636
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F4⤵
- Creates scheduled task(s)
PID:1260
-
-
-