Resubmissions
02-12-2021 07:35
211202-je6zgsfge4 1010-09-2021 20:31
210910-za2rzaaeh3 1010-09-2021 19:40
210910-ydvmdsdffp 1010-09-2021 12:06
210910-n9s4bsdbep 1010-09-2021 05:37
210910-gbjcxahdh2 1009-09-2021 22:16
210909-17av7aghb7 1009-09-2021 22:12
210909-14mqksgha9 1009-09-2021 22:12
210909-14l42sgha8 1009-09-2021 22:11
210909-14e1qsgha7 1009-09-2021 22:11
210909-138lnacacn 10Analysis
-
max time kernel
52s -
max time network
603s -
platform
windows7_x64 -
resource
win7-ja-20211104 -
submitted
02-12-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20211104
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211104
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211104
General
-
Target
setup_x86_x64_install.exe
-
Size
4.3MB
-
MD5
6d18c8e8ab9051f7a70b89ff7bb0ec35
-
SHA1
265311e2afd9f59e824f4b77162cf3dfa278eb7e
-
SHA256
8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d
-
SHA512
249bf79dc90d4662b942c7eed2a7b7816b749f6d5f7bc190bba05f826fa143d0b44f58054d8649b8626884c5fcbd1cea8abd625dc701d44b7aaac84fc74e47ff
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Extracted
redline
pab123
45.14.49.169:22411
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/memory/1528-233-0x00000000003D0000-0x00000000003EF000-memory.dmp family_redline behavioral1/memory/1528-235-0x0000000002CB0000-0x0000000002CCE000-memory.dmp family_redline -
Socelars Payload 1 IoCs
resource yara_rule behavioral1/files/0x000500000001262d-107.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/656-212-0x0000000003130000-0x0000000003201000-memory.dmp family_vidar behavioral1/memory/656-219-0x0000000000400000-0x0000000002BC5000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x00050000000125b1-71.dat aspack_v212_v242 behavioral1/files/0x00050000000125b1-72.dat aspack_v212_v242 behavioral1/files/0x000700000001226b-74.dat aspack_v212_v242 behavioral1/files/0x000700000001226b-73.dat aspack_v212_v242 behavioral1/files/0x00050000000125c3-78.dat aspack_v212_v242 behavioral1/files/0x00050000000125c3-77.dat aspack_v212_v242 -
Executes dropped EXE 14 IoCs
pid Process 1884 setup_installer.exe 1344 setup_install.exe 1780 Thu219d5fe8cf316.exe 656 Thu214ce31cede21.exe 1528 Thu21624565bb917a.exe 1476 Thu2156de5489c19.exe 1120 Thu214aaca5625.exe 1920 Thu21568b0ab8.exe 1856 Thu21b93295136197.exe 1772 Thu2102ff6cfe07c.exe 1664 Thu21a1ef054cac78a.exe 632 Thu21df5caa1b78de6.exe 1144 Thu21b9847cb6727.exe 1612 Thu21b93295136197.tmp -
Loads dropped DLL 52 IoCs
pid Process 1528 setup_x86_x64_install.exe 1884 setup_installer.exe 1884 setup_installer.exe 1884 setup_installer.exe 1884 setup_installer.exe 1884 setup_installer.exe 1884 setup_installer.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 1344 setup_install.exe 928 cmd.exe 1588 cmd.exe 928 cmd.exe 1740 cmd.exe 1740 cmd.exe 1692 cmd.exe 316 cmd.exe 1820 cmd.exe 1732 cmd.exe 656 Thu214ce31cede21.exe 1528 Thu21624565bb917a.exe 1528 Thu21624565bb917a.exe 656 Thu214ce31cede21.exe 1640 cmd.exe 1856 Thu21b93295136197.exe 1856 Thu21b93295136197.exe 1772 Thu2102ff6cfe07c.exe 1772 Thu2102ff6cfe07c.exe 320 cmd.exe 320 cmd.exe 2044 cmd.exe 556 cmd.exe 632 Thu21df5caa1b78de6.exe 632 Thu21df5caa1b78de6.exe 1664 Thu21a1ef054cac78a.exe 1664 Thu21a1ef054cac78a.exe 1856 Thu21b93295136197.exe 1612 Thu21b93295136197.tmp 1612 Thu21b93295136197.tmp 1612 Thu21b93295136197.tmp 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 8 ip-api.com 11 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1916 1344 WerFault.exe 30 2768 656 WerFault.exe 57 2896 1476 WerFault.exe 52 -
Kills process with taskkill 1 IoCs
pid Process 2528 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Thu21568b0ab8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Thu21568b0ab8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu21568b0ab8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Thu21a1ef054cac78a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Thu21a1ef054cac78a.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe 1524 powershell.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeCreateTokenPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeAssignPrimaryTokenPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeLockMemoryPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeIncreaseQuotaPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeMachineAccountPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeTcbPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeSecurityPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeTakeOwnershipPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeLoadDriverPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeSystemProfilePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeSystemtimePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeProfSingleProcessPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeIncBasePriorityPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeCreatePagefilePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeCreatePermanentPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeBackupPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeRestorePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeShutdownPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeAuditPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeSystemEnvironmentPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeChangeNotifyPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeRemoteShutdownPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeUndockPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeSyncAgentPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeEnableDelegationPrivilege 1664 Thu21a1ef054cac78a.exe Token: SeManageVolumePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeImpersonatePrivilege 1664 Thu21a1ef054cac78a.exe Token: SeCreateGlobalPrivilege 1664 Thu21a1ef054cac78a.exe Token: 31 1664 Thu21a1ef054cac78a.exe Token: 32 1664 Thu21a1ef054cac78a.exe Token: 33 1664 Thu21a1ef054cac78a.exe Token: 34 1664 Thu21a1ef054cac78a.exe Token: 35 1664 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 1916 WerFault.exe Token: SeDebugPrivilege 1780 Thu219d5fe8cf316.exe Token: SeDebugPrivilege 1920 Thu21568b0ab8.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 2768 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 Thu21b93295136197.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1528 wrote to memory of 1884 1528 setup_x86_x64_install.exe 29 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1884 wrote to memory of 1344 1884 setup_installer.exe 30 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1188 1344 setup_install.exe 32 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1588 1344 setup_install.exe 40 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 1740 1344 setup_install.exe 39 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 2044 1344 setup_install.exe 38 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1560 1344 setup_install.exe 37 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 1732 1344 setup_install.exe 36 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 556 1344 setup_install.exe 35 PID 1344 wrote to memory of 928 1344 setup_install.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1188
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2156de5489c19.exe4⤵
- Loads dropped DLL
PID:316 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu2156de5489c19.exeThu2156de5489c19.exe5⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1476 -s 8006⤵
- Program crash
PID:2896
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214ce31cede21.exe4⤵
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu214ce31cede21.exeThu214ce31cede21.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 9486⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b9847cb6727.exe4⤵
- Loads dropped DLL
PID:556 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21b9847cb6727.exeThu21b9847cb6727.exe5⤵
- Executes dropped EXE
PID:1144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b93295136197.exe4⤵
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21b93295136197.exeThu21b93295136197.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\is-I3NUV.tmp\Thu21b93295136197.tmp"C:\Users\Admin\AppData\Local\Temp\is-I3NUV.tmp\Thu21b93295136197.tmp" /SL5="$6012E,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21b93295136197.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2164f292a11ce.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21a1ef054cac78a.exe4⤵
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21a1ef054cac78a.exeThu21a1ef054cac78a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2488
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21624565bb917a.exe4⤵
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21624565bb917a.exeThu21624565bb917a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu219d5fe8cf316.exe4⤵
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu219d5fe8cf316.exeThu219d5fe8cf316.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214aaca5625.exe4⤵
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu214aaca5625.exeThu214aaca5625.exe5⤵
- Executes dropped EXE
PID:1120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4604⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2102ff6cfe07c.exe4⤵
- Loads dropped DLL
PID:1640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21568b0ab8.exe4⤵
- Loads dropped DLL
PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21df5caa1b78de6.exe /mixone4⤵
- Loads dropped DLL
PID:320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu2102ff6cfe07c.exeThu2102ff6cfe07c.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772
-
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21df5caa1b78de6.exeThu21df5caa1b78de6.exe /mixone1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:632
-
C:\Users\Admin\AppData\Local\Temp\7zSC572ED56\Thu21568b0ab8.exeThu21568b0ab8.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Windows\system32\taskeng.exetaskeng.exe {470FE475-4392-4643-9DBA-36A708270FC0} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2556
-
C:\Windows\system32\taskeng.exetaskeng.exe {C1A8CA2C-7342-45F4-B5FC-BD4A1F28203B} S-1-5-21-103686315-404690609-2047157615-1000:EDWYFHKN\Admin:Interactive:[1]1⤵PID:2616
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:2508
-