Analysis
-
max time kernel
4294211s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
15-03-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
Restr.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
Restr.exe
-
Size
252KB
-
MD5
16959900ff34c0ba60fe2a4d9f1242c5
-
SHA1
888148f1b31355192e26ea4fc97c91f4c4defe9e
-
SHA256
0f4395c5cdee1c9fe28ef9a63355594f0f7a23aa41e52b8085a0bda8715da13f
-
SHA512
a2b7a74fdc6525c5b8ecafc66706136e1e3996e28ebb3b1d8e236b120e59f8c4e85165f385365d706a8391ae2a5f30530a086c7820e26d1a6cd2f19a44da5d54
Malware Config
Extracted
Family
gozi_rm3
Attributes
-
build
300994
-
exe_type
loader
Signatures
-
Deletes itself 1 IoCs
pid Process 560 cmd.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2024 timeout.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc00000000020000000000106600000001000020000000e0424cdc6a0bd1780158b419987027644f9db33e9e8db730f124038195db7dc7000000000e8000000002000020000000372705df0a0d02ddcd73da2fdd80701c197e4f18e77c90878fb0e74701e4acfd300100001edcad16189f575ee4f189869ad4af76f46f5e8f42dbd72513c268d3325ea37ca196040581efca9fc8094d7e6951ae5939ee273d469921198d31e9377c9b13170b266835f88667784e34cf0921cc644779ebe38c87795099f4e6efb3fd850ee7ca14e9730bac0f2ecfcaf3cc398526de783af1061acde7ade77deef629e86830dfc34caff176f45b3e3e3dccd09003fc1aad7fc606a6745e7e5091d5b172bd1d6f9f818c1db43583e3f9a0880e1e6df459fc4ef140474edc190f3383f13ba649b3ecbf5a4514ac7216140c36d38811494000bfd8a1a7c8da816827ae115286ae9be5e4a20ceebd76cc68d0e8ee54c2cc67e4ae3f9ae372c81c00b2755be000941557cb970287b3ae83b3820c5df8ba77dfc8e9214d2d98cbefb237d8b020284bbdbd8c51434938635f24930680e1e95e40000000049fa51c708d612fc87806fa048a5f4a1b6cb5b606bc4ef19401f78dd3bb626d57c2ece30719fed450614e519a38a02838147094673f460bdef476ddded9a91b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc00000000020000000000106600000001000020000000ad98b0c8dbd0041c7a2b6633ee8f1584621464e0706430eab47b693f1df78fc9000000000e8000000002000020000000555543fe1f558e639c1f12be13ac4e4186f9a7c5d847b8a584f47ff3aaa7f8b9300100007ed8efba7868c3ac70ca3df9b27d3f4f1f150cf90fa422b083e824beff117cfc6c329115c7f8ad535a505cc3385f0d8d483b944e6a1255ea7472cd466cf26177101c7823d5f0916823f2961cbbfe25111cedf2b8e3a791c9aaec10805a4819857edbb29be1ad1d46139d897891020e9c525c836550808db88fb5a10bef458ef3c2d037a1f60e261358a4c3360eb53fec1695ff794a60f4cd153dd00aa7943533c143b2fdfca04e3e35854918ca95f80e4f5db8a49d1b74a714cffe2d5ec249c051fe907b44a8c231aa7e1241a206a622583c5acb1afb0e923597cfd22b1e325935eda0769860996116f0f20b09d500da036ebb50b8c7c480f6b3dbdbdf818a6062dffbdbc0ddaf13138b0e1c7671653192b4f36e3b565ab1e92e81c065a66db6eae18eb26d84c7a6fd7082d12d967b4e40000000d8b3c2d04420d1d0415df79a28d6754137a86b407820af67b3d7c2b8660a0337ca334e5aef0f85bd699cb7c4781ea64550edc5ab1adce40ebbaefb2388b67359 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc0000000002000000000010660000000100002000000051ac8743cf487117fe14a79028e2ce35385be2ed8fc034d94a258f233e751609000000000e8000000002000020000000623baf82939646b332065e0960d984c9b0043b7f8168fb91926ab13aa76a4fe8200000000b3c09e8e708ffa202ac693a2c6a64b22fe0dde332c468d63494070e05932178400000006f80b8ce6d7166b1b70ac848ecb3fbb0f2443199de1d37da138d7c8103976e9dc530d7aed1f0f826d5d22b04f5fcd8af48e600cc750c4a2c113bf97e611a8f7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc00000000020000000000106600000001000020000000f8af14d7020e27c2a21e9c1326469677ab222bad83e4c26670c388a978fd1aa2000000000e800000000200002000000059af66002c70c39d59bb5040bd5173b0efd402a19ca467486d992cac345ffccc9000000084fecdd82f65a1bac8bd8c1f3f5e68d77b3a4f865e6551dd76b1ad2533982b414bfeb528990390185447636c0f3fc5fdfa6c720292036e0579adcbeb15c205bd34c8be67fb213209307bd57b92c71be6273f61f22ade531ac31bb2699eaa3d227ba1bcbe4c15d4213e9d13c1cec9785e59a833cf62e7b9b1a51874d9271b5ff6edb807f1be55a289dd95037ae2b8532e40000000f64efbda8390ddc8db08b8523d14cbd3ff736aae620e330b19b4b2245988fbe356f12e3dc7d6039635e5ff100bbe5863e1d70828f34fca5ddee80103cf098363 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707487c13d38d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3200000032000000b804000097020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA820831-A430-11EC-9919-DECC31BAF6C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc000000000200000000001066000000010000200000002f2d9ed9b2f1567478b44ebd76eeb171015d8e7784b9c97216ac9cb9e392ad07000000000e80000000020000200000003d65076e99456db375e625c87f47d8a69fe4535b1ba46557516ce73cbb5f707930010000627d70ab23ebb612c61a0087c458e492e594f8fc9f53ad7e2635032b93481573031ddee0eb4745953a93bdd7b65f263a904006b29550a248300f9b70839ce1cbfefa84e164d65a0aa916dee4fe43b2a1346449ae94a4eb3470edfabc6f09fbe4f78eb1d344c9f4e32c36ea0a38aac4c0b653cc8ca4378a4f31b760b263b9b9de5b24e8f7f368d32a39945e78e779e27e699eda7a184b692f49cb88679fee99def3e5639f35c72b4ce1611a7521212209ccf8007c432e9d2574896b291a41d4891d75810114f0c1c1c64605d19e8098b564e4765a01dca9d83082511b1733190476c7a3ae70f8e04b97ee860b9d17bd8ee81504288ec133a1c457f93411d9c16a7fabbffef6391cc17b4ee6c540c057981c6b29be927c6d5072e3ff7f1115be56bcd724461223b2dd9378829f0ac23bce40000000ff66debbb0c1035197c815b68c4ee7e9dcd0ff65a7caf09b33d10c6fa5818bc95183259137474a049c67516ed39c07795546225d48178b0da9bfa2f4ec56a817 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff4b00000000000000d104000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1796 powershell.exe 560 powershell.exe 1876 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1796 powershell.exe 580 Restr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 1876 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 640 IEXPLORE.EXE 640 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1964 iexplore.exe 1964 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1576 1964 iexplore.exe 32 PID 1964 wrote to memory of 1576 1964 iexplore.exe 32 PID 1964 wrote to memory of 1576 1964 iexplore.exe 32 PID 1964 wrote to memory of 1576 1964 iexplore.exe 32 PID 1964 wrote to memory of 640 1964 iexplore.exe 34 PID 1964 wrote to memory of 640 1964 iexplore.exe 34 PID 1964 wrote to memory of 640 1964 iexplore.exe 34 PID 1964 wrote to memory of 640 1964 iexplore.exe 34 PID 964 wrote to memory of 592 964 cmd.exe 37 PID 964 wrote to memory of 592 964 cmd.exe 37 PID 964 wrote to memory of 592 964 cmd.exe 37 PID 592 wrote to memory of 1096 592 forfiles.exe 39 PID 592 wrote to memory of 1096 592 forfiles.exe 39 PID 592 wrote to memory of 1096 592 forfiles.exe 39 PID 1096 wrote to memory of 1796 1096 cmd.exe 40 PID 1096 wrote to memory of 1796 1096 cmd.exe 40 PID 1096 wrote to memory of 1796 1096 cmd.exe 40 PID 1796 wrote to memory of 560 1796 powershell.exe 41 PID 1796 wrote to memory of 560 1796 powershell.exe 41 PID 1796 wrote to memory of 560 1796 powershell.exe 41 PID 1796 wrote to memory of 1876 1796 powershell.exe 42 PID 1796 wrote to memory of 1876 1796 powershell.exe 42 PID 1796 wrote to memory of 1876 1796 powershell.exe 42 PID 1796 wrote to memory of 1884 1796 powershell.exe 45 PID 1796 wrote to memory of 1884 1796 powershell.exe 45 PID 1796 wrote to memory of 1884 1796 powershell.exe 45 PID 1884 wrote to memory of 1344 1884 csc.exe 46 PID 1884 wrote to memory of 1344 1884 csc.exe 46 PID 1884 wrote to memory of 1344 1884 csc.exe 46 PID 1796 wrote to memory of 1968 1796 powershell.exe 47 PID 1796 wrote to memory of 1968 1796 powershell.exe 47 PID 1796 wrote to memory of 1968 1796 powershell.exe 47 PID 1968 wrote to memory of 840 1968 csc.exe 48 PID 1968 wrote to memory of 840 1968 csc.exe 48 PID 1968 wrote to memory of 840 1968 csc.exe 48 PID 1796 wrote to memory of 1276 1796 powershell.exe 12 PID 580 wrote to memory of 1276 580 Restr.exe 12 PID 560 wrote to memory of 2024 560 cmd.exe 51 PID 560 wrote to memory of 2024 560 cmd.exe 51 PID 560 wrote to memory of 2024 560 cmd.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Restr.exe"C:\Users\Admin\AppData\Local\Temp\Restr.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA==5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAG8AdgB0AHMAbAB5ACkAOwBbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABvAHYAdABzAGwAeQApACcA6⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApACcA6⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pfhkfkff.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE7D1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE7D0.tmp"7⤵PID:1344
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dlbyujxt.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE88C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE88B.tmp"7⤵PID:840
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RESTR.EXE"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2024
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:734213 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:640
-