Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-01-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe
Resource
win7-en-20211208
General
-
Target
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe
-
Size
5.7MB
-
MD5
998dd3d8897f2c619d9e5975f7aeed7e
-
SHA1
817745be0e42515167e1650b77630b7b34c4e8ab
-
SHA256
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2
-
SHA512
cdb8fc0e08007911bcf5d51af6cafc4773ec10df8cf91f9c132d36c23dbee1fac563651f9cdf4513a01fdb4d95cf26d4695944e1eda3067dee4d4b9c04cc25bd
Malware Config
Extracted
cryptbot
cemeif67.top
morota06.top
-
payload_url
http://bojitn09.top/download.php?file=lv.exe
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x0005000000014027-82.dat family_babadeda -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 824 msiexec.exe 5 1168 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 fsucenter.exe -
Loads dropped DLL 11 IoCs
pid Process 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 1816 MsiExec.exe 1816 MsiExec.exe 544 MsiExec.exe 544 MsiExec.exe 544 MsiExec.exe 544 MsiExec.exe 544 MsiExec.exe 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 1124 fsucenter.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\S: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\Q: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\F: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\Y: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\J: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\M: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\X: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\V: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\U: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\W: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI5BEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5CB7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5DB2.tmp msiexec.exe File created C:\Windows\Installer\f7641e2.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6CE0.tmp msiexec.exe File opened for modification C:\Windows\Installer\f7641e0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5871.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f7641e2.ipi msiexec.exe File created C:\Windows\Installer\f7641e0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5719.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fsucenter.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fsucenter.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 976 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 msiexec.exe 1168 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1168 msiexec.exe Token: SeTakeOwnershipPrivilege 1168 msiexec.exe Token: SeSecurityPrivilege 1168 msiexec.exe Token: SeCreateTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeAssignPrimaryTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeLockMemoryPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeIncreaseQuotaPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeMachineAccountPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeTcbPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSecurityPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeTakeOwnershipPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeLoadDriverPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemProfilePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemtimePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeProfSingleProcessPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeIncBasePriorityPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreatePagefilePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreatePermanentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeBackupPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeRestorePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeShutdownPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeDebugPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeAuditPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemEnvironmentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeChangeNotifyPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeRemoteShutdownPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeUndockPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSyncAgentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeEnableDelegationPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeManageVolumePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeImpersonatePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreateGlobalPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreateTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeAssignPrimaryTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeLockMemoryPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeIncreaseQuotaPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeMachineAccountPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeTcbPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSecurityPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeTakeOwnershipPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeLoadDriverPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemProfilePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemtimePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeProfSingleProcessPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeIncBasePriorityPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreatePagefilePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreatePermanentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeBackupPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeRestorePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeShutdownPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeDebugPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeAuditPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSystemEnvironmentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeChangeNotifyPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeRemoteShutdownPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeUndockPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeSyncAgentPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeEnableDelegationPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeManageVolumePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeImpersonatePrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreateGlobalPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeCreateTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeAssignPrimaryTokenPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe Token: SeLockMemoryPrivilege 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 824 msiexec.exe 824 msiexec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1168 wrote to memory of 1816 1168 msiexec.exe 28 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1316 wrote to memory of 824 1316 d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe 29 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 544 1168 msiexec.exe 30 PID 1168 wrote to memory of 1124 1168 msiexec.exe 31 PID 1168 wrote to memory of 1124 1168 msiexec.exe 31 PID 1168 wrote to memory of 1124 1168 msiexec.exe 31 PID 1168 wrote to memory of 1124 1168 msiexec.exe 31 PID 1124 wrote to memory of 1836 1124 fsucenter.exe 34 PID 1124 wrote to memory of 1836 1124 fsucenter.exe 34 PID 1124 wrote to memory of 1836 1124 fsucenter.exe 34 PID 1124 wrote to memory of 1836 1124 fsucenter.exe 34 PID 1836 wrote to memory of 976 1836 cmd.exe 36 PID 1836 wrote to memory of 976 1836 cmd.exe 36 PID 1836 wrote to memory of 976 1836 cmd.exe 36 PID 1836 wrote to memory of 976 1836 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe"C:\Users\Admin\AppData\Local\Temp\d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\linq2db.net\Linq Reports Creator 3.6.7.2\install\129B23C\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1642354267 " AI_EUIMSI=""2⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:824
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ADE1D9C0DDDC29D576404620C103BA0E C2⤵
- Loads dropped DLL
PID:1816
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B6C98CD0E5F1059FB618478951F512C72⤵
- Loads dropped DLL
PID:544
-
-
C:\Users\Admin\AppData\Roaming\linq2db.net\Linq Reports Creator\fsucenter.exe"C:\Users\Admin\AppData\Roaming\linq2db.net\Linq Reports Creator\fsucenter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\pUHwHdST & timeout 4 & del /f /q "C:\Users\Admin\AppData\Roaming\linq2db.net\Linq Reports Creator\fsucenter.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:976
-
-
-