Resubmissions
02-12-2021 07:35
211202-je6zgsfge4 1010-09-2021 20:31
210910-za2rzaaeh3 1010-09-2021 19:40
210910-ydvmdsdffp 1010-09-2021 12:06
210910-n9s4bsdbep 1010-09-2021 05:37
210910-gbjcxahdh2 1009-09-2021 22:16
210909-17av7aghb7 1009-09-2021 22:12
210909-14mqksgha9 1009-09-2021 22:12
210909-14l42sgha8 1009-09-2021 22:11
210909-14e1qsgha7 1009-09-2021 22:11
210909-138lnacacn 10Analysis
-
max time kernel
605s -
max time network
606s -
platform
windows7_x64 -
resource
win7-de-20211104 -
submitted
02-12-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20211104
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211104
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211104
General
-
Target
setup_x86_x64_install.exe
-
Size
4.3MB
-
MD5
6d18c8e8ab9051f7a70b89ff7bb0ec35
-
SHA1
265311e2afd9f59e824f4b77162cf3dfa278eb7e
-
SHA256
8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d
-
SHA512
249bf79dc90d4662b942c7eed2a7b7816b749f6d5f7bc190bba05f826fa143d0b44f58054d8649b8626884c5fcbd1cea8abd625dc701d44b7aaac84fc74e47ff
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Signatures
-
Socelars Payload 3 IoCs
resource yara_rule behavioral3/files/0x0006000000012269-105.dat family_socelars behavioral3/files/0x0006000000012269-167.dat family_socelars behavioral3/files/0x0006000000012269-178.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral3/memory/1752-192-0x0000000003210000-0x00000000032E1000-memory.dmp family_vidar behavioral3/memory/1752-236-0x0000000000400000-0x0000000002BC5000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x0006000000012220-71.dat aspack_v212_v242 behavioral3/files/0x0006000000012220-72.dat aspack_v212_v242 behavioral3/files/0x0007000000012212-74.dat aspack_v212_v242 behavioral3/files/0x0007000000012212-73.dat aspack_v212_v242 behavioral3/files/0x0006000000012228-77.dat aspack_v212_v242 behavioral3/files/0x0006000000012228-78.dat aspack_v212_v242 -
Executes dropped EXE 13 IoCs
pid Process 1516 setup_installer.exe 848 setup_install.exe 1752 Thu214ce31cede21.exe 1780 Thu219d5fe8cf316.exe 1092 Thu2156de5489c19.exe 656 Thu21b93295136197.exe 752 Thu21568b0ab8.exe 992 Thu214aaca5625.exe 1100 Thu21df5caa1b78de6.exe 1216 Thu21a1ef054cac78a.exe 1068 Thu2102ff6cfe07c.exe 1928 Thu21b93295136197.tmp 1996 Thu214aaca5625.tmp -
Loads dropped DLL 57 IoCs
pid Process 1228 setup_x86_x64_install.exe 1516 setup_installer.exe 1516 setup_installer.exe 1516 setup_installer.exe 1516 setup_installer.exe 1516 setup_installer.exe 1516 setup_installer.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 848 setup_install.exe 1832 cmd.exe 1832 cmd.exe 1848 cmd.exe 1752 Thu214ce31cede21.exe 1752 Thu214ce31cede21.exe 940 cmd.exe 1956 cmd.exe 1768 cmd.exe 1276 cmd.exe 1276 cmd.exe 856 cmd.exe 656 Thu21b93295136197.exe 656 Thu21b93295136197.exe 1800 cmd.exe 992 Thu214aaca5625.exe 992 Thu214aaca5625.exe 1424 cmd.exe 1068 Thu2102ff6cfe07c.exe 1068 Thu2102ff6cfe07c.exe 1100 Thu21df5caa1b78de6.exe 1100 Thu21df5caa1b78de6.exe 656 Thu21b93295136197.exe 992 Thu214aaca5625.exe 1928 Thu21b93295136197.tmp 1928 Thu21b93295136197.tmp 1928 Thu21b93295136197.tmp 1996 Thu214aaca5625.tmp 1996 Thu214aaca5625.tmp 1996 Thu214aaca5625.tmp 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1216 Thu21a1ef054cac78a.exe 1216 Thu21a1ef054cac78a.exe 1648 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io 11 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1648 848 WerFault.exe 30 2536 1752 WerFault.exe 46 2580 1100 WerFault.exe 49 -
Kills process with taskkill 1 IoCs
pid Process 2336 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Thu21a1ef054cac78a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Thu21a1ef054cac78a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Thu21568b0ab8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu21568b0ab8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Thu21568b0ab8.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 1788 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 1648 WerFault.exe 1928 Thu21b93295136197.tmp 2536 WerFault.exe 2580 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeCreateTokenPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeAssignPrimaryTokenPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeLockMemoryPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeIncreaseQuotaPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeMachineAccountPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeTcbPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeSecurityPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeTakeOwnershipPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeLoadDriverPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeSystemProfilePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeSystemtimePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeProfSingleProcessPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeIncBasePriorityPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeCreatePagefilePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeCreatePermanentPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeBackupPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeRestorePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeShutdownPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeAuditPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeSystemEnvironmentPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeChangeNotifyPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeRemoteShutdownPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeUndockPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeSyncAgentPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeEnableDelegationPrivilege 1216 Thu21a1ef054cac78a.exe Token: SeManageVolumePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeImpersonatePrivilege 1216 Thu21a1ef054cac78a.exe Token: SeCreateGlobalPrivilege 1216 Thu21a1ef054cac78a.exe Token: 31 1216 Thu21a1ef054cac78a.exe Token: 32 1216 Thu21a1ef054cac78a.exe Token: 33 1216 Thu21a1ef054cac78a.exe Token: 34 1216 Thu21a1ef054cac78a.exe Token: 35 1216 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 1648 WerFault.exe Token: SeDebugPrivilege 752 Thu21568b0ab8.exe Token: SeDebugPrivilege 2336 taskkill.exe Token: SeDebugPrivilege 2536 WerFault.exe Token: SeDebugPrivilege 2580 WerFault.exe Token: SeDebugPrivilege 1092 Thu2156de5489c19.exe Token: SeDebugPrivilege 1788 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 Thu21b93295136197.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1228 wrote to memory of 1516 1228 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 1516 wrote to memory of 848 1516 setup_installer.exe 30 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1808 848 setup_install.exe 32 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1848 848 setup_install.exe 34 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1560 848 setup_install.exe 33 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1800 848 setup_install.exe 35 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1504 848 setup_install.exe 36 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 1956 848 setup_install.exe 37 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 884 848 setup_install.exe 38 PID 848 wrote to memory of 1832 848 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1808
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21624565bb917a.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu219d5fe8cf316.exe4⤵
- Loads dropped DLL
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu219d5fe8cf316.exeThu219d5fe8cf316.exe5⤵
- Executes dropped EXE
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21a1ef054cac78a.exe4⤵
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu21a1ef054cac78a.exeThu21a1ef054cac78a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2304
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2164f292a11ce.exe4⤵PID:1504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b93295136197.exe4⤵
- Loads dropped DLL
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu21b93295136197.exeThu21b93295136197.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\is-7P5C2.tmp\Thu21b93295136197.tmp"C:\Users\Admin\AppData\Local\Temp\is-7P5C2.tmp\Thu21b93295136197.tmp" /SL5="$7011E,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu21b93295136197.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1928
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b9847cb6727.exe4⤵PID:884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214ce31cede21.exe4⤵
- Loads dropped DLL
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu214ce31cede21.exeThu214ce31cede21.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 9686⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2156de5489c19.exe4⤵
- Loads dropped DLL
PID:940 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu2156de5489c19.exeThu2156de5489c19.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214aaca5625.exe4⤵
- Loads dropped DLL
PID:856 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu214aaca5625.exeThu214aaca5625.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\is-VATQ0.tmp\Thu214aaca5625.tmp"C:\Users\Admin\AppData\Local\Temp\is-VATQ0.tmp\Thu214aaca5625.tmp" /SL5="$6012C,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu214aaca5625.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21df5caa1b78de6.exe /mixone4⤵
- Loads dropped DLL
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu21df5caa1b78de6.exeThu21df5caa1b78de6.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 2886⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2102ff6cfe07c.exe4⤵
- Loads dropped DLL
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu2102ff6cfe07c.exeThu2102ff6cfe07c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21568b0ab8.exe4⤵
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5CD2F5\Thu21568b0ab8.exeThu21568b0ab8.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 4604⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CD00584A-776F-4830-9BF8-FF8944BAFC64} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2984
-
C:\Windows\system32\taskeng.exetaskeng.exe {D6222DE8-16D3-46C6-A752-5D04324013AD} S-1-5-21-103686315-404690609-2047157615-1000:EDWYFHKN\Admin:Interactive:[1]1⤵PID:3040
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:1288
-