Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
12-03-2022 08:44
Static task
static1
Behavioral task
behavioral1
Sample
8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe
Resource
win10v2004-20220310-en
General
-
Target
8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe
-
Size
670KB
-
MD5
e57825558128cf42f67346dcf2319e64
-
SHA1
d3d940ccbdb64aa57261599511a09d507b5dd417
-
SHA256
8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736
-
SHA512
e7209f05adde4813627d142808091ecb002ecd581f58d6905e4a4228f48df27ee4f087c8b4ff11d89acf2607a6628519d030a10070d2ea46185170a698dc00a1
Malware Config
Signatures
-
SaintBot Payload 2 IoCs
resource yara_rule behavioral2/memory/4644-149-0x0000000000400000-0x000000000040B000-memory.dmp family_saintbot behavioral2/memory/4820-173-0x00000000004A0000-0x00000000004AB000-memory.dmp family_saintbot -
Nirsoft 10 IoCs
resource yara_rule behavioral2/files/0x0007000000021e70-138.dat Nirsoft behavioral2/files/0x0007000000021e70-139.dat Nirsoft behavioral2/files/0x0007000000021e70-140.dat Nirsoft behavioral2/files/0x0007000000021e70-141.dat Nirsoft behavioral2/files/0x0007000000021e70-142.dat Nirsoft behavioral2/files/0x000d000000021e59-156.dat Nirsoft behavioral2/files/0x000d000000021e59-157.dat Nirsoft behavioral2/files/0x000d000000021e59-158.dat Nirsoft behavioral2/files/0x000d000000021e59-159.dat Nirsoft behavioral2/files/0x000d000000021e59-160.dat Nirsoft -
Executes dropped EXE 12 IoCs
pid Process 3636 AdvancedRun.exe 3724 AdvancedRun.exe 216 AdvancedRun.exe 4324 AdvancedRun.exe 3804 Wrvqtyoyuopenbullet.exe 2724 Microsoft Edge.exe 2112 AdvancedRun.exe 1724 AdvancedRun.exe 8 AdvancedRun.exe 800 AdvancedRun.exe 4224 Microsoft Edge.exe 4496 Wrvqtyoyuopenbullet.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation Microsoft Edge.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe -
Loads dropped DLL 2 IoCs
pid Process 4224 Microsoft Edge.exe 4820 dfrgui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\zzAdmin\\Admin.vbs" dfrgui.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Microsoft Edge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum dfrgui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 dfrgui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Microsoft Edge.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dfrgui.exe dfrgui.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5072 set thread context of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 2724 set thread context of 4224 2724 Microsoft Edge.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1092 3804 WerFault.exe 95 3108 4496 WerFault.exe 113 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dfrgui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dfrgui.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 524 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000_Classes\Local Settings 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000_Classes\Local Settings Microsoft Edge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1952 PING.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3636 AdvancedRun.exe 3636 AdvancedRun.exe 3636 AdvancedRun.exe 3636 AdvancedRun.exe 3724 AdvancedRun.exe 3724 AdvancedRun.exe 3724 AdvancedRun.exe 3724 AdvancedRun.exe 216 AdvancedRun.exe 216 AdvancedRun.exe 216 AdvancedRun.exe 216 AdvancedRun.exe 4324 AdvancedRun.exe 4324 AdvancedRun.exe 4324 AdvancedRun.exe 4324 AdvancedRun.exe 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 2112 AdvancedRun.exe 2112 AdvancedRun.exe 2112 AdvancedRun.exe 2112 AdvancedRun.exe 1724 AdvancedRun.exe 1724 AdvancedRun.exe 1724 AdvancedRun.exe 1724 AdvancedRun.exe 8 AdvancedRun.exe 8 AdvancedRun.exe 8 AdvancedRun.exe 8 AdvancedRun.exe 800 AdvancedRun.exe 800 AdvancedRun.exe 800 AdvancedRun.exe 800 AdvancedRun.exe 2724 Microsoft Edge.exe 2724 Microsoft Edge.exe 4224 Microsoft Edge.exe 4224 Microsoft Edge.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe Token: SeDebugPrivilege 3636 AdvancedRun.exe Token: SeImpersonatePrivilege 3636 AdvancedRun.exe Token: SeDebugPrivilege 3724 AdvancedRun.exe Token: SeImpersonatePrivilege 3724 AdvancedRun.exe Token: SeDebugPrivilege 216 AdvancedRun.exe Token: SeImpersonatePrivilege 216 AdvancedRun.exe Token: SeDebugPrivilege 4324 AdvancedRun.exe Token: SeImpersonatePrivilege 4324 AdvancedRun.exe Token: SeDebugPrivilege 2724 Microsoft Edge.exe Token: SeDebugPrivilege 2112 AdvancedRun.exe Token: SeImpersonatePrivilege 2112 AdvancedRun.exe Token: SeDebugPrivilege 1724 AdvancedRun.exe Token: SeImpersonatePrivilege 1724 AdvancedRun.exe Token: SeDebugPrivilege 8 AdvancedRun.exe Token: SeImpersonatePrivilege 8 AdvancedRun.exe Token: SeDebugPrivilege 800 AdvancedRun.exe Token: SeImpersonatePrivilege 800 AdvancedRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3636 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 89 PID 5072 wrote to memory of 3636 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 89 PID 5072 wrote to memory of 3636 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 89 PID 3636 wrote to memory of 3724 3636 AdvancedRun.exe 90 PID 3636 wrote to memory of 3724 3636 AdvancedRun.exe 90 PID 3636 wrote to memory of 3724 3636 AdvancedRun.exe 90 PID 5072 wrote to memory of 216 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 92 PID 5072 wrote to memory of 216 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 92 PID 5072 wrote to memory of 216 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 92 PID 216 wrote to memory of 4324 216 AdvancedRun.exe 93 PID 216 wrote to memory of 4324 216 AdvancedRun.exe 93 PID 216 wrote to memory of 4324 216 AdvancedRun.exe 93 PID 5072 wrote to memory of 1156 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 94 PID 5072 wrote to memory of 1156 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 94 PID 5072 wrote to memory of 1156 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 94 PID 1156 wrote to memory of 3804 1156 WScript.exe 95 PID 1156 wrote to memory of 3804 1156 WScript.exe 95 PID 1156 wrote to memory of 3804 1156 WScript.exe 95 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 5072 wrote to memory of 4644 5072 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 96 PID 4644 wrote to memory of 2724 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 97 PID 4644 wrote to memory of 2724 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 97 PID 4644 wrote to memory of 2724 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 97 PID 4644 wrote to memory of 4920 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 98 PID 4644 wrote to memory of 4920 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 98 PID 4644 wrote to memory of 4920 4644 8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe 98 PID 4920 wrote to memory of 1952 4920 cmd.exe 100 PID 4920 wrote to memory of 1952 4920 cmd.exe 100 PID 4920 wrote to memory of 1952 4920 cmd.exe 100 PID 4920 wrote to memory of 1804 4920 cmd.exe 101 PID 4920 wrote to memory of 1804 4920 cmd.exe 101 PID 4920 wrote to memory of 1804 4920 cmd.exe 101 PID 2724 wrote to memory of 2112 2724 Microsoft Edge.exe 106 PID 2724 wrote to memory of 2112 2724 Microsoft Edge.exe 106 PID 2724 wrote to memory of 2112 2724 Microsoft Edge.exe 106 PID 2112 wrote to memory of 1724 2112 AdvancedRun.exe 107 PID 2112 wrote to memory of 1724 2112 AdvancedRun.exe 107 PID 2112 wrote to memory of 1724 2112 AdvancedRun.exe 107 PID 2724 wrote to memory of 8 2724 Microsoft Edge.exe 108 PID 2724 wrote to memory of 8 2724 Microsoft Edge.exe 108 PID 2724 wrote to memory of 8 2724 Microsoft Edge.exe 108 PID 8 wrote to memory of 800 8 AdvancedRun.exe 109 PID 8 wrote to memory of 800 8 AdvancedRun.exe 109 PID 8 wrote to memory of 800 8 AdvancedRun.exe 109 PID 2724 wrote to memory of 3988 2724 Microsoft Edge.exe 110 PID 2724 wrote to memory of 3988 2724 Microsoft Edge.exe 110 PID 2724 wrote to memory of 3988 2724 Microsoft Edge.exe 110 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111 PID 2724 wrote to memory of 4224 2724 Microsoft Edge.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe"C:\Users\Admin\AppData\Local\Temp\8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 36363⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 2163⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sqsxfhynivxwpl.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Wrvqtyoyuopenbullet.exe"C:\Users\Admin\AppData\Local\Temp\Wrvqtyoyuopenbullet.exe"3⤵
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 10524⤵
- Program crash
PID:1092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exeC:\Users\Admin\AppData\Local\Temp\8f5315482513b1df3511cc3b8dc47cb635ef5d4ad66d4c1b615b928be21b1736.exe2⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 21125⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 85⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sqsxfhynivxwpl.vbs"4⤵
- Checks computer location settings
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Wrvqtyoyuopenbullet.exe"C:\Users\Admin\AppData\Local\Temp\Wrvqtyoyuopenbullet.exe"5⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 10206⤵
- Program crash
PID:3108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Windows\SysWOW64\dfrgui.exe"C:\Windows\system32\dfrgui.exe"5⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Checks processor information in registry
PID:4820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 5 /tn "Update" /tr "%SYSTEMDRIVE%\Users\%USERNAME%\AppData\Local\zz%USERNAME%\%USERNAME%.vbs" /F6⤵
- Creates scheduled task(s)
PID:524
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 34⤵
- Runs ping.exe
PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"4⤵PID:1804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3804 -ip 38041⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4496 -ip 44961⤵PID:2080