Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
08-03-2022 10:22
Static task
static1
Behavioral task
behavioral1
Sample
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe
Resource
win10v2004-en-20220112
General
-
Target
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe
-
Size
340KB
-
MD5
8a4e7a24fc1e0828ed209a7adcd023ea
-
SHA1
a6d749c5a2d019821c7635827ae3a96d29e729d2
-
SHA256
ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c
-
SHA512
defe84bb5119e386534b8c894974d4dd68e8fc6b360b7bccad5cb13bb093a91801317363c86017ab7a48bcb4d9d89298d8b7ee105ff10f6bef38418ad31065d9
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1100-72-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral1/memory/1100-74-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
suricata: ET MALWARE ISRStealer Checkin
suricata: ET MALWARE ISRStealer Checkin
-
NirSoft MailPassView 6 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1984-93-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1984-94-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/912-121-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/912-120-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1480-154-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1480-155-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral1/memory/1984-93-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1984-94-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/912-121-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/912-120-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1480-154-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1480-155-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 39 IoCs
pid Process 1064 filename.exe 1100 filename.exe 916 filename.exe 1984 filename.exe 1220 filename.exe 668 filename.exe 1240 filename.exe 912 filename.exe 1376 filename.exe 788 filename.exe 828 filename.exe 1480 filename.exe 1116 filename.exe 816 filename.exe 1016 filename.exe 1620 filename.exe 1132 filename.exe 1224 filename.exe 1508 filename.exe 1672 filename.exe 1476 filename.exe 960 filename.exe 1744 filename.exe 1508 filename.exe 2044 filename.exe 1140 filename.exe 756 filename.exe 1744 filename.exe 1696 filename.exe 948 filename.exe 660 filename.exe 2024 filename.exe 924 filename.exe 1428 filename.exe 1828 filename.exe 2008 filename.exe 1588 filename.exe 1608 filename.exe 944 filename.exe -
resource yara_rule behavioral1/memory/916-80-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/916-84-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/916-86-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/916-85-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1984-88-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1984-92-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1984-93-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1984-94-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/912-119-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/912-121-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/912-120-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1480-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1480-154-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1480-155-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 648 cmd.exe 648 cmd.exe 1064 filename.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.txt | cmd" reg.exe -
Suspicious use of SetThreadContext 29 IoCs
description pid Process procid_target PID 1064 set thread context of 1100 1064 filename.exe 34 PID 1100 set thread context of 916 1100 filename.exe 38 PID 1100 set thread context of 1984 1100 filename.exe 48 PID 1220 set thread context of 668 1220 filename.exe 59 PID 668 set thread context of 1240 668 filename.exe 62 PID 668 set thread context of 912 668 filename.exe 73 PID 1376 set thread context of 788 1376 filename.exe 83 PID 788 set thread context of 828 788 filename.exe 86 PID 788 set thread context of 1480 788 filename.exe 114 PID 1116 set thread context of 816 1116 filename.exe 125 PID 816 set thread context of 1016 816 filename.exe 128 PID 816 set thread context of 1620 816 filename.exe 139 PID 1132 set thread context of 1224 1132 filename.exe 151 PID 1224 set thread context of 1508 1224 filename.exe 154 PID 1224 set thread context of 1672 1224 filename.exe 165 PID 1476 set thread context of 960 1476 filename.exe 177 PID 960 set thread context of 1744 960 filename.exe 181 PID 960 set thread context of 1508 960 filename.exe 191 PID 2044 set thread context of 1140 2044 filename.exe 203 PID 1140 set thread context of 756 1140 filename.exe 206 PID 1140 set thread context of 1744 1140 filename.exe 217 PID 1696 set thread context of 948 1696 filename.exe 229 PID 948 set thread context of 660 948 filename.exe 232 PID 948 set thread context of 2024 948 filename.exe 243 PID 924 set thread context of 1428 924 filename.exe 255 PID 1428 set thread context of 1828 1428 filename.exe 258 PID 1428 set thread context of 2008 1428 filename.exe 269 PID 1588 set thread context of 1608 1588 filename.exe 281 PID 1608 set thread context of 944 1608 filename.exe 284 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe 1064 filename.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe Token: SeDebugPrivilege 1064 filename.exe Token: SeDebugPrivilege 1220 filename.exe Token: SeDebugPrivilege 1376 filename.exe Token: SeDebugPrivilege 1116 filename.exe Token: SeDebugPrivilege 1132 filename.exe Token: SeDebugPrivilege 1476 filename.exe Token: SeDebugPrivilege 2044 filename.exe Token: SeDebugPrivilege 1696 filename.exe Token: SeDebugPrivilege 924 filename.exe Token: SeDebugPrivilege 1588 filename.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1100 filename.exe 668 filename.exe 788 filename.exe 816 filename.exe 1224 filename.exe 960 filename.exe 1140 filename.exe 948 filename.exe 1428 filename.exe 1608 filename.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 648 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 27 PID 1548 wrote to memory of 648 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 27 PID 1548 wrote to memory of 648 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 27 PID 1548 wrote to memory of 648 1548 ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe 27 PID 648 wrote to memory of 1064 648 cmd.exe 29 PID 648 wrote to memory of 1064 648 cmd.exe 29 PID 648 wrote to memory of 1064 648 cmd.exe 29 PID 648 wrote to memory of 1064 648 cmd.exe 29 PID 1064 wrote to memory of 396 1064 filename.exe 31 PID 1064 wrote to memory of 396 1064 filename.exe 31 PID 1064 wrote to memory of 396 1064 filename.exe 31 PID 1064 wrote to memory of 396 1064 filename.exe 31 PID 396 wrote to memory of 1764 396 cmd.exe 33 PID 396 wrote to memory of 1764 396 cmd.exe 33 PID 396 wrote to memory of 1764 396 cmd.exe 33 PID 396 wrote to memory of 1764 396 cmd.exe 33 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1100 1064 filename.exe 34 PID 1064 wrote to memory of 1600 1064 filename.exe 35 PID 1064 wrote to memory of 1600 1064 filename.exe 35 PID 1064 wrote to memory of 1600 1064 filename.exe 35 PID 1064 wrote to memory of 1600 1064 filename.exe 35 PID 1600 wrote to memory of 1012 1600 cmd.exe 37 PID 1600 wrote to memory of 1012 1600 cmd.exe 37 PID 1600 wrote to memory of 1012 1600 cmd.exe 37 PID 1600 wrote to memory of 1012 1600 cmd.exe 37 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1100 wrote to memory of 916 1100 filename.exe 38 PID 1064 wrote to memory of 456 1064 filename.exe 39 PID 1064 wrote to memory of 456 1064 filename.exe 39 PID 1064 wrote to memory of 456 1064 filename.exe 39 PID 1064 wrote to memory of 456 1064 filename.exe 39 PID 456 wrote to memory of 1828 456 cmd.exe 41 PID 456 wrote to memory of 1828 456 cmd.exe 41 PID 456 wrote to memory of 1828 456 cmd.exe 41 PID 456 wrote to memory of 1828 456 cmd.exe 41 PID 1064 wrote to memory of 952 1064 filename.exe 42 PID 1064 wrote to memory of 952 1064 filename.exe 42 PID 1064 wrote to memory of 952 1064 filename.exe 42 PID 1064 wrote to memory of 952 1064 filename.exe 42 PID 952 wrote to memory of 1968 952 cmd.exe 44 PID 952 wrote to memory of 1968 952 cmd.exe 44 PID 952 wrote to memory of 1968 952 cmd.exe 44 PID 952 wrote to memory of 1968 952 cmd.exe 44 PID 1064 wrote to memory of 1756 1064 filename.exe 45 PID 1064 wrote to memory of 1756 1064 filename.exe 45 PID 1064 wrote to memory of 1756 1064 filename.exe 45 PID 1064 wrote to memory of 1756 1064 filename.exe 45 PID 1756 wrote to memory of 1284 1756 cmd.exe 47 PID 1756 wrote to memory of 1284 1756 cmd.exe 47 PID 1756 wrote to memory of 1284 1756 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe"C:\Users\Admin\AppData\Local\Temp\ad1a4c5946a69d9cae50f2dd06676f8b93291a794b21bf8fdb807e44575ca08c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵PID:1764
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\EAgWU8f6Pc.ini"5⤵
- Executes dropped EXE
PID:916
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\3XatlCWe8T.ini"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵
- Adds Run key to start application
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵
- Adds Run key to start application
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵PID:1716
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵PID:2008
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"5⤵
- Adds Run key to start application
PID:1412
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:1256
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵
- Adds Run key to start application
PID:1516
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\AOqUJTGUiF.ini"6⤵
- Executes dropped EXE
PID:1240
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\KD4x6ednAq.ini"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:2044
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵
- Adds Run key to start application
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:1740
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵
- Adds Run key to start application
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:396
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵
- Adds Run key to start application
PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:1732
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"5⤵PID:952
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"6⤵
- Adds Run key to start application
PID:556
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1632
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1548
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\YvCcM1aiTe.ini"7⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\VFK5xQR3PA.ini"7⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1916
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1516
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1744
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1764
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1960
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:952
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:972
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1016
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:804
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:1736
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵PID:968
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"7⤵
- Adds Run key to start application
PID:1652
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1932
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵
- Adds Run key to start application
PID:296
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:816 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ixUfR4WYwI.ini"8⤵
- Executes dropped EXE
PID:1016
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\EeIghYwmXv.ini"8⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1476
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵
- Adds Run key to start application
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1900
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:2044
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1908
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵
- Adds Run key to start application
PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1652
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"7⤵PID:1704
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"8⤵PID:1572
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:972
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:960
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tfdL57Se5a.ini"9⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\NezOBHHIJU.ini"9⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:1228
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:1968
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:824
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:948
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:1388
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵PID:2024
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"9⤵
- Adds Run key to start application
PID:1540
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:1896
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵
- Adds Run key to start application
PID:1908
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\EXNyYbNk9G.ini"10⤵
- Executes dropped EXE
PID:1744
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\kDEpHf39BY.ini"10⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:1020
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵
- Adds Run key to start application
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:948
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵
- Adds Run key to start application
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:1764
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵
- Adds Run key to start application
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:872
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:1672
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"9⤵PID:1224
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"10⤵
- Adds Run key to start application
PID:1132
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:1000
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵
- Adds Run key to start application
PID:1480
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\1Z1qaegNdk.ini"11⤵
- Executes dropped EXE
PID:756
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\Ik8f729BD8.ini"11⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:952
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:1388
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵
- Adds Run key to start application
PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:872
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵
- Adds Run key to start application
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:1528
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵
- Adds Run key to start application
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:1508
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:564
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"11⤵PID:1776
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:916
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵PID:1960
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\96eFUegQMz.ini"12⤵
- Executes dropped EXE
PID:660
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\YX7fNacRSU.ini"12⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:1280
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:1604
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵
- Adds Run key to start application
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:944
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵
- Adds Run key to start application
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:1412
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵
- Adds Run key to start application
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:1672
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵
- Adds Run key to start application
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"11⤵PID:1268
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"12⤵
- Adds Run key to start application
PID:988
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1980
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵PID:1012
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tVcqDnB9Tk.ini"13⤵
- Executes dropped EXE
PID:1828
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\Hw4G7j7AZF.ini"13⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1280
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1224
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1648
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1300
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1988
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:1704
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"13⤵
- Adds Run key to start application
PID:432
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\cmd.exe"cmd"13⤵PID:1064
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"14⤵
- Adds Run key to start application
PID:1256
-
-
-
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\Desktop\jmvbndfdhdhd\filename.exe/scomma "C:\Users\Admin\AppData\Local\Temp\ZdgJkNqrHY.ini"14⤵
- Executes dropped EXE
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"13⤵PID:1060
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Update" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Update.txt" | cmd"14⤵
- Adds Run key to start application
PID:1100
-
-
-
-
-
-
-
-
-
-
-
-
-