Analysis
-
max time kernel
165s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01/02/2022, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe
Resource
win10v2004-en-20220112
General
-
Target
2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe
-
Size
1.2MB
-
MD5
d62c6d8c6bbb845302757504fdcc38be
-
SHA1
c46abb02c682683a4e92657a07da2bedc8d640ad
-
SHA256
2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b
-
SHA512
9a3702e6988973f49b4090e4250a09afd0cbec17e8fe8af4dfc38e1b29cfc238bee05c535cb9a7d9d37a84ef5d14ae790f942ead05ce987d7a6bb374aafc5a60
Malware Config
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Signatures
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\epl-v10.html tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.nl_ja_4.4.0.v20140623020002.jar tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\SPPRedist.msi tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageStoreLogo.scale-125_contrast-black.png tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler.nl_zh_4.4.0.v20140623020002.jar tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\org-openide-modules.jar tgytutrc4722.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\mpvis.dll.mui tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSVCP140_APP.DLL tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\WideTile.scale-125.png tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler.xml tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\LucidaTypewriterRegular.ttf tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\System\ole db\xmlrwbin.dll tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\word.x-none.msi.16.x-none.vreg.dat tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription1-ul-oob.xrm-ms tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-125_contrast-black.png tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\COPYRIGHT tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-modules_zh_CN.jar tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\splashscreen.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHEVI.DLL tgytutrc4722.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-utilities.xml tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow.xml tgytutrc4722.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_LinkNoDrop32x32.gif tgytutrc4722.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libwave_plugin.dll tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSplashScreen.scale-125_contrast-black.png tgytutrc4722.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TabTip.exe.mui tgytutrc4722.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\d3dcompiler_47.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-ui.xml tgytutrc4722.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\msinfo32.exe.mui tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.SF tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\COPYRIGHT tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-TW\msipc.dll.mui tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\zip.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\javafx.properties tgytutrc4722.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxSignature.p7x tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\locale\updater_ja.jar tgytutrc4722.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnscfg.exe.mui tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraWideTile.contrast-white_scale-200.png tgytutrc4722.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libsubsdelay_plugin.dll tgytutrc4722.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libpanoramix_plugin.dll tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\BadgeLogo.scale-125.png tgytutrc4722.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fontconfig.bfc tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri tgytutrc4722.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeLogo.scale-125.png tgytutrc4722.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ts_plugin.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF tgytutrc4722.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\profilerinterface.dll tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\sunpkcs11.jar tgytutrc4722.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe tgytutrc4722.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui tgytutrc4722.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\t2k.dll tgytutrc4722.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\ImagingDevices.exe.mui tgytutrc4722.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1248 tgytutrc4722.exe 1248 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 1604 tgytutrc4722.exe 1604 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3840 tgytutrc4722.exe 3840 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3484 tgytutrc4722.exe 3840 tgytutrc4722.exe 3840 tgytutrc4722.exe 1872 tgytutrc4722.exe 1872 tgytutrc4722.exe 1872 tgytutrc4722.exe 1872 tgytutrc4722.exe 1248 tgytutrc4722.exe 1248 tgytutrc4722.exe 1872 tgytutrc4722.exe 1872 tgytutrc4722.exe 1248 tgytutrc4722.exe 1248 tgytutrc4722.exe 1872 tgytutrc4722.exe 1872 tgytutrc4722.exe 3840 tgytutrc4722.exe 3840 tgytutrc4722.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3692 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe Token: SeBackupPrivilege 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe Token: SeRestorePrivilege 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe Token: SeLockMemoryPrivilege 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe Token: SeCreateGlobalPrivilege 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe Token: SeDebugPrivilege 2312 tgytutrc4722.exe Token: SeBackupPrivilege 2312 tgytutrc4722.exe Token: SeRestorePrivilege 2312 tgytutrc4722.exe Token: SeLockMemoryPrivilege 2312 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 2312 tgytutrc4722.exe Token: SeDebugPrivilege 1604 tgytutrc4722.exe Token: SeBackupPrivilege 1604 tgytutrc4722.exe Token: SeDebugPrivilege 1248 tgytutrc4722.exe Token: SeBackupPrivilege 1248 tgytutrc4722.exe Token: SeRestorePrivilege 1248 tgytutrc4722.exe Token: SeLockMemoryPrivilege 1248 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 1248 tgytutrc4722.exe Token: SeDebugPrivilege 3484 tgytutrc4722.exe Token: SeBackupPrivilege 3484 tgytutrc4722.exe Token: SeRestorePrivilege 3484 tgytutrc4722.exe Token: SeLockMemoryPrivilege 3484 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 3484 tgytutrc4722.exe Token: SeRestorePrivilege 1604 tgytutrc4722.exe Token: SeLockMemoryPrivilege 1604 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 1604 tgytutrc4722.exe Token: SeDebugPrivilege 3840 tgytutrc4722.exe Token: SeBackupPrivilege 3840 tgytutrc4722.exe Token: SeRestorePrivilege 3840 tgytutrc4722.exe Token: SeLockMemoryPrivilege 3840 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 3840 tgytutrc4722.exe Token: SeDebugPrivilege 1872 tgytutrc4722.exe Token: SeBackupPrivilege 1872 tgytutrc4722.exe Token: SeRestorePrivilege 1872 tgytutrc4722.exe Token: SeLockMemoryPrivilege 1872 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 1872 tgytutrc4722.exe Token: SeDebugPrivilege 2916 tgytutrc4722.exe Token: SeBackupPrivilege 2916 tgytutrc4722.exe Token: SeRestorePrivilege 2916 tgytutrc4722.exe Token: SeLockMemoryPrivilege 2916 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 2916 tgytutrc4722.exe Token: SeDebugPrivilege 2980 tgytutrc4722.exe Token: SeBackupPrivilege 2980 tgytutrc4722.exe Token: SeRestorePrivilege 2980 tgytutrc4722.exe Token: SeLockMemoryPrivilege 2980 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 2980 tgytutrc4722.exe Token: SeDebugPrivilege 1820 tgytutrc4722.exe Token: SeBackupPrivilege 1820 tgytutrc4722.exe Token: SeRestorePrivilege 1820 tgytutrc4722.exe Token: SeLockMemoryPrivilege 1820 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 1820 tgytutrc4722.exe Token: SeDebugPrivilege 1212 tgytutrc4722.exe Token: SeBackupPrivilege 1212 tgytutrc4722.exe Token: SeRestorePrivilege 1212 tgytutrc4722.exe Token: SeLockMemoryPrivilege 1212 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 1212 tgytutrc4722.exe Token: SeDebugPrivilege 3908 tgytutrc4722.exe Token: SeBackupPrivilege 3908 tgytutrc4722.exe Token: SeRestorePrivilege 3908 tgytutrc4722.exe Token: SeLockMemoryPrivilege 3908 tgytutrc4722.exe Token: SeCreateGlobalPrivilege 3908 tgytutrc4722.exe Token: SeDebugPrivilege 2936 tgytutrc4722.exe Token: SeBackupPrivilege 2936 tgytutrc4722.exe Token: SeRestorePrivilege 2936 tgytutrc4722.exe Token: SeLockMemoryPrivilege 2936 tgytutrc4722.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 3692 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe 54 PID 3952 wrote to memory of 3692 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe 54 PID 3952 wrote to memory of 2312 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe 56 PID 3952 wrote to memory of 2312 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe 56 PID 3952 wrote to memory of 2312 3952 2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe 56 PID 2312 wrote to memory of 2872 2312 tgytutrc4722.exe 57 PID 2312 wrote to memory of 2872 2312 tgytutrc4722.exe 57 PID 2312 wrote to memory of 3600 2312 tgytutrc4722.exe 58 PID 2312 wrote to memory of 3600 2312 tgytutrc4722.exe 58 PID 2312 wrote to memory of 3816 2312 tgytutrc4722.exe 66 PID 2312 wrote to memory of 3816 2312 tgytutrc4722.exe 66 PID 2312 wrote to memory of 2560 2312 tgytutrc4722.exe 65 PID 2312 wrote to memory of 2560 2312 tgytutrc4722.exe 65 PID 2312 wrote to memory of 3656 2312 tgytutrc4722.exe 63 PID 2312 wrote to memory of 3656 2312 tgytutrc4722.exe 63 PID 2312 wrote to memory of 1652 2312 tgytutrc4722.exe 67 PID 2312 wrote to memory of 1652 2312 tgytutrc4722.exe 67 PID 1652 wrote to memory of 3936 1652 net.exe 69 PID 1652 wrote to memory of 3936 1652 net.exe 69 PID 2312 wrote to memory of 2536 2312 tgytutrc4722.exe 71 PID 2312 wrote to memory of 2536 2312 tgytutrc4722.exe 71 PID 2536 wrote to memory of 2376 2536 net.exe 72 PID 2536 wrote to memory of 2376 2536 net.exe 72 PID 2312 wrote to memory of 3484 2312 tgytutrc4722.exe 73 PID 2312 wrote to memory of 3484 2312 tgytutrc4722.exe 73 PID 2312 wrote to memory of 3484 2312 tgytutrc4722.exe 73 PID 2312 wrote to memory of 1248 2312 tgytutrc4722.exe 75 PID 2312 wrote to memory of 1248 2312 tgytutrc4722.exe 75 PID 2312 wrote to memory of 1248 2312 tgytutrc4722.exe 75 PID 2312 wrote to memory of 1604 2312 tgytutrc4722.exe 74 PID 2312 wrote to memory of 1604 2312 tgytutrc4722.exe 74 PID 2312 wrote to memory of 1604 2312 tgytutrc4722.exe 74 PID 2312 wrote to memory of 3840 2312 tgytutrc4722.exe 78 PID 2312 wrote to memory of 3840 2312 tgytutrc4722.exe 78 PID 2312 wrote to memory of 3840 2312 tgytutrc4722.exe 78 PID 2312 wrote to memory of 1872 2312 tgytutrc4722.exe 80 PID 2312 wrote to memory of 1872 2312 tgytutrc4722.exe 80 PID 2312 wrote to memory of 1872 2312 tgytutrc4722.exe 80 PID 2312 wrote to memory of 2916 2312 tgytutrc4722.exe 81 PID 2312 wrote to memory of 2916 2312 tgytutrc4722.exe 81 PID 2312 wrote to memory of 2916 2312 tgytutrc4722.exe 81 PID 2312 wrote to memory of 2980 2312 tgytutrc4722.exe 82 PID 2312 wrote to memory of 2980 2312 tgytutrc4722.exe 82 PID 2312 wrote to memory of 2980 2312 tgytutrc4722.exe 82 PID 2312 wrote to memory of 1820 2312 tgytutrc4722.exe 83 PID 2312 wrote to memory of 1820 2312 tgytutrc4722.exe 83 PID 2312 wrote to memory of 1820 2312 tgytutrc4722.exe 83 PID 2312 wrote to memory of 1212 2312 tgytutrc4722.exe 84 PID 2312 wrote to memory of 1212 2312 tgytutrc4722.exe 84 PID 2312 wrote to memory of 1212 2312 tgytutrc4722.exe 84 PID 2312 wrote to memory of 3908 2312 tgytutrc4722.exe 85 PID 2312 wrote to memory of 3908 2312 tgytutrc4722.exe 85 PID 2312 wrote to memory of 3908 2312 tgytutrc4722.exe 85 PID 2312 wrote to memory of 2936 2312 tgytutrc4722.exe 87 PID 2312 wrote to memory of 2936 2312 tgytutrc4722.exe 87 PID 2312 wrote to memory of 2936 2312 tgytutrc4722.exe 87 PID 2312 wrote to memory of 3936 2312 tgytutrc4722.exe 88 PID 2312 wrote to memory of 3936 2312 tgytutrc4722.exe 88 PID 2312 wrote to memory of 3936 2312 tgytutrc4722.exe 88 PID 2312 wrote to memory of 1952 2312 tgytutrc4722.exe 89 PID 2312 wrote to memory of 1952 2312 tgytutrc4722.exe 89 PID 2312 wrote to memory of 1952 2312 tgytutrc4722.exe 89 PID 2312 wrote to memory of 2948 2312 tgytutrc4722.exe 90 PID 2312 wrote to memory of 2948 2312 tgytutrc4722.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe"C:\Users\Admin\AppData\Local\Temp\2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move /y C:\Users\Admin\AppData\Local\Temp\2fe3c29913f66c255cb7aa5c34821ab182f889e7f96c25bad31267adc8a19e5b.exe C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe2⤵
- Suspicious behavior: RenamesItself
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -m2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\logoff.exeC:\Windows\system32\logoff.exe 03⤵PID:2872
-
-
C:\Windows\system32\logoff.exeC:\Windows\system32\logoff.exe 03⤵PID:3600
-
-
C:\Windows\system32\logoff.exeC:\Windows\system32\logoff.exe 03⤵PID:3656
-
-
C:\Windows\system32\logoff.exeC:\Windows\system32\logoff.exe 03⤵PID:2560
-
-
C:\Windows\system32\logoff.exeC:\Windows\system32\logoff.exe 03⤵PID:3816
-
-
C:\Windows\system32\net.exeC:\Windows\system32\net.exe user Admin HuHuHUHoHo283283@dJD3⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin HuHuHUHoHo283283@dJD4⤵PID:3936
-
-
-
C:\Windows\system32\net.exeC:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJD3⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Administrator HuHuHUHoHo283283@dJD4⤵PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵
- Drops file in Program Files directory
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exeC:\Users\Admin\AppData\Local\Temp\tgytutrc4722.exe -i SM-tgytutrc -s3⤵PID:852
-
-