Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01/02/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe
Resource
win10v2004-en-20220113
General
-
Target
2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe
-
Size
1.2MB
-
MD5
66b9f03ccf1b0c4b2dad55d3f60b040c
-
SHA1
d330988c7baf1ca42ac40a9990a5626894c628c4
-
SHA256
2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce
-
SHA512
c61a75ad69165d3ee6140553b945b2739e2380678fc2fbb0b6df4dd71fef3a3cb1d5f8edf306da119c7be36d9f19a1c6aee208b03472d0f5791ae4c591b0c47b
Malware Config
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Signatures
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmpnssci.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-80.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml fbdkdchf5696.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Square71x71Logo.scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\vlc.mo fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnetwk.exe.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-180.png fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-140.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSquare150x150Logo.scale-125_contrast-black.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x fbdkdchf5696.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-100.png fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\PhotoViewer.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-125_contrast-white.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSplashScreen.scale-125_contrast-black.png fbdkdchf5696.exe File opened for modification C:\Program Files\Common Files\System\msadc\msaddsr.dll fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_company.png fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.di_1.4.0.v20140414-1837.jar fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnssci.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-125_contrast-white.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmpnetwk.exe.mui fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-180.png fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.net.nl_ja_4.4.0.v20140623020002.jar fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\tools.jar fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_zh_CN.jar fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\StoreLogo.scale-125_contrast-black.png fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-core-execution.xml_hidden fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\hijrah-config-umalqura.properties fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\vlc.mo fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-140.png fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-140.png fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_window.html fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-openide-options.xml_hidden fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-options-keymap.xml_hidden fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\SOLVER\SOLVER32.DLL fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\StopwatchSmallTile.contrast-black_scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\PeopleMedTile.scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.scale-125_contrast-white.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\PeopleAppStoreLogo.scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_stats_plugin.dll fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\vlc.mo fbdkdchf5696.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libafile_plugin.dll fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnssci.dll.mui fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\images\Square44x44Logo.scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GKWord.dll fbdkdchf5696.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe fbdkdchf5696.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-80.png fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\SplashScreen.scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-lib-uihandler.xml_hidden fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TimerSmallTile.contrast-white_scale-125.png fbdkdchf5696.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib fbdkdchf5696.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-white_scale-125.png fbdkdchf5696.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4508 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4464 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe 4572 fbdkdchf5696.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe Token: SeBackupPrivilege 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe Token: SeRestorePrivilege 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe Token: SeLockMemoryPrivilege 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe Token: SeCreateGlobalPrivilege 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe Token: SeDebugPrivilege 4520 fbdkdchf5696.exe Token: SeBackupPrivilege 4520 fbdkdchf5696.exe Token: SeRestorePrivilege 4520 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 4520 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 4520 fbdkdchf5696.exe Token: SeDebugPrivilege 4464 fbdkdchf5696.exe Token: SeBackupPrivilege 4464 fbdkdchf5696.exe Token: SeRestorePrivilege 4464 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 4464 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 4464 fbdkdchf5696.exe Token: SeDebugPrivilege 4572 fbdkdchf5696.exe Token: SeBackupPrivilege 4572 fbdkdchf5696.exe Token: SeRestorePrivilege 4572 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 4572 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 4572 fbdkdchf5696.exe Token: SeDebugPrivilege 4508 fbdkdchf5696.exe Token: SeBackupPrivilege 4508 fbdkdchf5696.exe Token: SeRestorePrivilege 4508 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 4508 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 4508 fbdkdchf5696.exe Token: SeDebugPrivilege 4672 fbdkdchf5696.exe Token: SeBackupPrivilege 4672 fbdkdchf5696.exe Token: SeRestorePrivilege 4672 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 4672 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 4672 fbdkdchf5696.exe Token: SeDebugPrivilege 3208 fbdkdchf5696.exe Token: SeBackupPrivilege 3208 fbdkdchf5696.exe Token: SeRestorePrivilege 3208 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 3208 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 3208 fbdkdchf5696.exe Token: SeDebugPrivilege 2516 fbdkdchf5696.exe Token: SeBackupPrivilege 2516 fbdkdchf5696.exe Token: SeRestorePrivilege 2516 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 2516 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 2516 fbdkdchf5696.exe Token: SeDebugPrivilege 3432 fbdkdchf5696.exe Token: SeBackupPrivilege 3432 fbdkdchf5696.exe Token: SeRestorePrivilege 3432 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 3432 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 3432 fbdkdchf5696.exe Token: SeDebugPrivilege 3712 fbdkdchf5696.exe Token: SeBackupPrivilege 3712 fbdkdchf5696.exe Token: SeRestorePrivilege 3712 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 3712 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 3712 fbdkdchf5696.exe Token: SeDebugPrivilege 1304 fbdkdchf5696.exe Token: SeBackupPrivilege 1304 fbdkdchf5696.exe Token: SeRestorePrivilege 1304 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 1304 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 1304 fbdkdchf5696.exe Token: SeDebugPrivilege 2028 fbdkdchf5696.exe Token: SeBackupPrivilege 2028 fbdkdchf5696.exe Token: SeRestorePrivilege 2028 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 2028 fbdkdchf5696.exe Token: SeCreateGlobalPrivilege 2028 fbdkdchf5696.exe Token: SeDebugPrivilege 2216 fbdkdchf5696.exe Token: SeBackupPrivilege 2216 fbdkdchf5696.exe Token: SeRestorePrivilege 2216 fbdkdchf5696.exe Token: SeLockMemoryPrivilege 2216 fbdkdchf5696.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2336 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe 82 PID 1604 wrote to memory of 2336 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe 82 PID 1604 wrote to memory of 4520 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe 84 PID 1604 wrote to memory of 4520 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe 84 PID 1604 wrote to memory of 4520 1604 2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe 84 PID 4520 wrote to memory of 4572 4520 fbdkdchf5696.exe 85 PID 4520 wrote to memory of 4572 4520 fbdkdchf5696.exe 85 PID 4520 wrote to memory of 4572 4520 fbdkdchf5696.exe 85 PID 4520 wrote to memory of 4464 4520 fbdkdchf5696.exe 87 PID 4520 wrote to memory of 4464 4520 fbdkdchf5696.exe 87 PID 4520 wrote to memory of 4464 4520 fbdkdchf5696.exe 87 PID 4520 wrote to memory of 4508 4520 fbdkdchf5696.exe 86 PID 4520 wrote to memory of 4508 4520 fbdkdchf5696.exe 86 PID 4520 wrote to memory of 4508 4520 fbdkdchf5696.exe 86 PID 4520 wrote to memory of 4672 4520 fbdkdchf5696.exe 93 PID 4520 wrote to memory of 4672 4520 fbdkdchf5696.exe 93 PID 4520 wrote to memory of 4672 4520 fbdkdchf5696.exe 93 PID 4520 wrote to memory of 3208 4520 fbdkdchf5696.exe 94 PID 4520 wrote to memory of 3208 4520 fbdkdchf5696.exe 94 PID 4520 wrote to memory of 3208 4520 fbdkdchf5696.exe 94 PID 4520 wrote to memory of 2516 4520 fbdkdchf5696.exe 95 PID 4520 wrote to memory of 2516 4520 fbdkdchf5696.exe 95 PID 4520 wrote to memory of 2516 4520 fbdkdchf5696.exe 95 PID 4520 wrote to memory of 3432 4520 fbdkdchf5696.exe 97 PID 4520 wrote to memory of 3432 4520 fbdkdchf5696.exe 97 PID 4520 wrote to memory of 3432 4520 fbdkdchf5696.exe 97 PID 4520 wrote to memory of 3712 4520 fbdkdchf5696.exe 98 PID 4520 wrote to memory of 3712 4520 fbdkdchf5696.exe 98 PID 4520 wrote to memory of 3712 4520 fbdkdchf5696.exe 98 PID 4520 wrote to memory of 1304 4520 fbdkdchf5696.exe 100 PID 4520 wrote to memory of 1304 4520 fbdkdchf5696.exe 100 PID 4520 wrote to memory of 1304 4520 fbdkdchf5696.exe 100 PID 4520 wrote to memory of 2028 4520 fbdkdchf5696.exe 102 PID 4520 wrote to memory of 2028 4520 fbdkdchf5696.exe 102 PID 4520 wrote to memory of 2028 4520 fbdkdchf5696.exe 102 PID 4520 wrote to memory of 2216 4520 fbdkdchf5696.exe 105 PID 4520 wrote to memory of 2216 4520 fbdkdchf5696.exe 105 PID 4520 wrote to memory of 2216 4520 fbdkdchf5696.exe 105 PID 4520 wrote to memory of 2640 4520 fbdkdchf5696.exe 107 PID 4520 wrote to memory of 2640 4520 fbdkdchf5696.exe 107 PID 4520 wrote to memory of 2640 4520 fbdkdchf5696.exe 107 PID 4520 wrote to memory of 2908 4520 fbdkdchf5696.exe 108 PID 4520 wrote to memory of 2908 4520 fbdkdchf5696.exe 108 PID 4520 wrote to memory of 2908 4520 fbdkdchf5696.exe 108 PID 4520 wrote to memory of 4416 4520 fbdkdchf5696.exe 109 PID 4520 wrote to memory of 4416 4520 fbdkdchf5696.exe 109 PID 4520 wrote to memory of 4416 4520 fbdkdchf5696.exe 109 PID 4520 wrote to memory of 3452 4520 fbdkdchf5696.exe 111 PID 4520 wrote to memory of 3452 4520 fbdkdchf5696.exe 111 PID 4520 wrote to memory of 3452 4520 fbdkdchf5696.exe 111 PID 4520 wrote to memory of 1472 4520 fbdkdchf5696.exe 112 PID 4520 wrote to memory of 1472 4520 fbdkdchf5696.exe 112 PID 4520 wrote to memory of 1472 4520 fbdkdchf5696.exe 112 PID 4520 wrote to memory of 2012 4520 fbdkdchf5696.exe 113 PID 4520 wrote to memory of 2012 4520 fbdkdchf5696.exe 113 PID 4520 wrote to memory of 2012 4520 fbdkdchf5696.exe 113 PID 4520 wrote to memory of 612 4520 fbdkdchf5696.exe 114 PID 4520 wrote to memory of 612 4520 fbdkdchf5696.exe 114 PID 4520 wrote to memory of 612 4520 fbdkdchf5696.exe 114 PID 4520 wrote to memory of 444 4520 fbdkdchf5696.exe 116 PID 4520 wrote to memory of 444 4520 fbdkdchf5696.exe 116 PID 4520 wrote to memory of 444 4520 fbdkdchf5696.exe 116 PID 4520 wrote to memory of 4952 4520 fbdkdchf5696.exe 117 PID 4520 wrote to memory of 4952 4520 fbdkdchf5696.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe"C:\Users\Admin\AppData\Local\Temp\2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c move /y C:\Users\Admin\AppData\Local\Temp\2ce4984a74a36dcdc380c435c9495241db4ca7e107fc2ba50d2fe775fb6b73ce.exe C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe2⤵
- Suspicious behavior: RenamesItself
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -m2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:612
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exeC:\Users\Admin\AppData\Local\Temp\fbdkdchf5696.exe -i SM-fbdkdchf -s3⤵
- Drops file in Program Files directory
PID:3240
-
-