Analysis
-
max time kernel
132s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2022 14:20
Static task
static1
Behavioral task
behavioral1
Sample
lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe
Resource
win10v2004-20220721-en
General
-
Target
lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe
-
Size
1.1MB
-
MD5
1dae99466ebd8bb0dcd10a0dad664310
-
SHA1
5407aa0bed4dfb96dbb97fca018900bb9e60d40c
-
SHA256
94b31c76e3a98889bb14573bbf9de1e4d8626ae635ffa64f6edf24e1b83ee724
-
SHA512
3f99b018dbff4dd960471f203d9b0e60796cf5f8e3c1f7f188f637383fa85e1913bfeac6dc41d99ea63d2bd13b4f286d88a0b324a98d17f70d6273122da9850c
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 1 IoCs
pid Process 4640 qmsq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1620 set thread context of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4120 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000_Classes\Local Settings lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe Token: SeDebugPrivilege 4640 qmsq.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4296 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe 4296 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 652 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 94 PID 1620 wrote to memory of 4296 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 95 PID 1620 wrote to memory of 4296 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 95 PID 1620 wrote to memory of 4296 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 95 PID 1620 wrote to memory of 3156 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 96 PID 1620 wrote to memory of 3156 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 96 PID 1620 wrote to memory of 3156 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 96 PID 1620 wrote to memory of 4328 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 98 PID 1620 wrote to memory of 4328 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 98 PID 1620 wrote to memory of 4328 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 98 PID 1620 wrote to memory of 2808 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 100 PID 1620 wrote to memory of 2808 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 100 PID 1620 wrote to memory of 2808 1620 lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe 100 PID 4328 wrote to memory of 4120 4328 cmd.exe 102 PID 4328 wrote to memory of 4120 4328 cmd.exe 102 PID 4328 wrote to memory of 4120 4328 cmd.exe 102 PID 4296 wrote to memory of 1340 4296 AcroRd32.exe 103 PID 4296 wrote to memory of 1340 4296 AcroRd32.exe 103 PID 4296 wrote to memory of 1340 4296 AcroRd32.exe 103 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106 PID 1340 wrote to memory of 4400 1340 RdrCEF.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe"C:\Users\Admin\AppData\Local\Temp\lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:652
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\file.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AD166C61C1564C2D1BB17D7F3068E6A3 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4400
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F03CE8EDF872A0D14F622B2D74B777B8 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F03CE8EDF872A0D14F622B2D74B777B8 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵PID:456
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F07A5DB43671A97029341A202F12E069 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F07A5DB43671A97029341A202F12E069 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:14⤵PID:3944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=82DE11B1BD2AE3032D437E8D7436F2E5 --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3650523CA69E2FE1FCF4C8D1DD453E5A --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6C543FF41397C5F2DFF6C3D47E972649 --mojo-platform-channel-handle=2008 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4612
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\qmsq"2⤵PID:3156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\qmsq\qmsq.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\qmsq\qmsq.exe'" /f3⤵
- Creates scheduled task(s)
PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\lLMcduOpiIm7FFc7v53h5NhiauY1-6ZPbt8k4bg_5yQ.exe" "C:\Users\Admin\AppData\Roaming\qmsq\qmsq.exe"2⤵PID:2808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Users\Admin\AppData\Roaming\qmsq\qmsq.exeC:\Users\Admin\AppData\Roaming\qmsq\qmsq.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD533e77f08076d0a57cf0c49bac2eb5427
SHA14913cfb36cf8faa5df289eda8dfc35a196c37df4
SHA2564df1b409aeabe59d70d24524e2b2ca1b9ac1a7b5b65722df951faacbc8e44d1a
SHA5125320f8d8585d298a5af08bf5120b66b78edbe253d4e0299855e52624fde28e025caf78a1c17c770c82ec8a3f8becb25eaa3afbb5ac02a82503e9f17b31ee0070
-
Filesize
1.1MB
MD51dae99466ebd8bb0dcd10a0dad664310
SHA15407aa0bed4dfb96dbb97fca018900bb9e60d40c
SHA25694b31c76e3a98889bb14573bbf9de1e4d8626ae635ffa64f6edf24e1b83ee724
SHA5123f99b018dbff4dd960471f203d9b0e60796cf5f8e3c1f7f188f637383fa85e1913bfeac6dc41d99ea63d2bd13b4f286d88a0b324a98d17f70d6273122da9850c
-
Filesize
1.1MB
MD51dae99466ebd8bb0dcd10a0dad664310
SHA15407aa0bed4dfb96dbb97fca018900bb9e60d40c
SHA25694b31c76e3a98889bb14573bbf9de1e4d8626ae635ffa64f6edf24e1b83ee724
SHA5123f99b018dbff4dd960471f203d9b0e60796cf5f8e3c1f7f188f637383fa85e1913bfeac6dc41d99ea63d2bd13b4f286d88a0b324a98d17f70d6273122da9850c