Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 23:52
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230831-en
windows7-x64
13 signatures
150 seconds
General
-
Target
Loader.exe
-
Size
44.2MB
-
MD5
3717f7d447fa2e11b78085b70b4db53d
-
SHA1
4fdceba008248c134f1ec61b16968816716b0140
-
SHA256
cc566bd4e3bab54426f4940e6817ff0a1e0be39bfd2ece80cce4ee0c0674e02d
-
SHA512
a6c942095ace315c77934ac2eff9f5535d992342abee31b8a2c328e694499c28ee71a3d9fb80351f9dfd62cb28c4eb73fb00563dae71f02fb6759c2c29e64ee2
-
SSDEEP
786432:yte4pWy7IuSLAtMXnjj/o0nGsJqNdT8biIY9eZOtuhq+4J/EjXbF:yte4UuSLAiXnjj1k7gnaeZOEh74JkbF
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
resource yara_rule behavioral2/memory/1404-1-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1404-2-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1404-3-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1404-6-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1404-7-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1404-9-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1016-30-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1016-33-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/4528-39-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/3832-41-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida behavioral2/memory/1016-69-0x00007FF6FCE70000-0x00007FF6FDE70000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 54 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1404 Loader.exe 1016 Loader.exe 368 Loader.exe 4528 Loader.exe 3832 Loader.exe 4656 Loader.exe 2272 Loader.exe 3932 Loader.exe 1776 Loader.exe -
Drops file in Windows directory 36 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 548 1404 WerFault.exe 84 4684 1016 WerFault.exe 98 520 3832 WerFault.exe 102 5032 4656 WerFault.exe 103 1376 1776 WerFault.exe 107 2428 3932 WerFault.exe 106 3556 2272 WerFault.exe 104 872 4528 WerFault.exe 101 1804 368 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 9 IoCs
pid Process 1404 Loader.exe 1016 Loader.exe 368 Loader.exe 4528 Loader.exe 3832 Loader.exe 4656 Loader.exe 2272 Loader.exe 3932 Loader.exe 1776 Loader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeShutdownPrivilege 4140 powercfg.exe Token: SeCreatePagefilePrivilege 4140 powercfg.exe Token: SeShutdownPrivilege 4140 powercfg.exe Token: SeCreatePagefilePrivilege 4140 powercfg.exe Token: SeShutdownPrivilege 4276 powercfg.exe Token: SeCreatePagefilePrivilege 4276 powercfg.exe Token: SeShutdownPrivilege 4276 powercfg.exe Token: SeCreatePagefilePrivilege 4276 powercfg.exe Token: SeShutdownPrivilege 1836 powercfg.exe Token: SeCreatePagefilePrivilege 1836 powercfg.exe Token: SeShutdownPrivilege 1836 powercfg.exe Token: SeCreatePagefilePrivilege 1836 powercfg.exe Token: SeShutdownPrivilege 2768 powercfg.exe Token: SeCreatePagefilePrivilege 2768 powercfg.exe Token: SeShutdownPrivilege 2768 powercfg.exe Token: SeCreatePagefilePrivilege 2768 powercfg.exe Token: SeShutdownPrivilege 4160 powercfg.exe Token: SeCreatePagefilePrivilege 4160 powercfg.exe Token: SeShutdownPrivilege 4160 powercfg.exe Token: SeCreatePagefilePrivilege 4160 powercfg.exe Token: SeShutdownPrivilege 2252 powercfg.exe Token: SeCreatePagefilePrivilege 2252 powercfg.exe Token: SeShutdownPrivilege 2252 powercfg.exe Token: SeCreatePagefilePrivilege 2252 powercfg.exe Token: SeShutdownPrivilege 4708 powercfg.exe Token: SeCreatePagefilePrivilege 4708 powercfg.exe Token: SeShutdownPrivilege 4708 powercfg.exe Token: SeCreatePagefilePrivilege 4708 powercfg.exe Token: SeShutdownPrivilege 4744 powercfg.exe Token: SeCreatePagefilePrivilege 4744 powercfg.exe Token: SeShutdownPrivilege 4744 powercfg.exe Token: SeCreatePagefilePrivilege 4744 powercfg.exe Token: SeShutdownPrivilege 2244 powercfg.exe Token: SeCreatePagefilePrivilege 2244 powercfg.exe Token: SeShutdownPrivilege 2244 powercfg.exe Token: SeCreatePagefilePrivilege 2244 powercfg.exe Token: SeDebugPrivilege 4284 taskmgr.exe Token: SeSystemProfilePrivilege 4284 taskmgr.exe Token: SeCreateGlobalPrivilege 4284 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe 4284 taskmgr.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1404 Loader.exe 1016 Loader.exe 368 Loader.exe 4528 Loader.exe 3832 Loader.exe 4656 Loader.exe 2272 Loader.exe 3932 Loader.exe 1776 Loader.exe 1016 Loader.exe 368 Loader.exe 4528 Loader.exe 3832 Loader.exe 4656 Loader.exe 2272 Loader.exe 3932 Loader.exe 1776 Loader.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3160 1404 Loader.exe 88 PID 1404 wrote to memory of 3160 1404 Loader.exe 88 PID 3160 wrote to memory of 4140 3160 cmd.exe 90 PID 3160 wrote to memory of 4140 3160 cmd.exe 90 PID 1016 wrote to memory of 2068 1016 Loader.exe 108 PID 1016 wrote to memory of 2068 1016 Loader.exe 108 PID 2068 wrote to memory of 4276 2068 cmd.exe 110 PID 2068 wrote to memory of 4276 2068 cmd.exe 110 PID 3832 wrote to memory of 5052 3832 Loader.exe 114 PID 3832 wrote to memory of 5052 3832 Loader.exe 114 PID 5052 wrote to memory of 1836 5052 cmd.exe 116 PID 5052 wrote to memory of 1836 5052 cmd.exe 116 PID 4656 wrote to memory of 3280 4656 Loader.exe 118 PID 4656 wrote to memory of 3280 4656 Loader.exe 118 PID 3280 wrote to memory of 2768 3280 cmd.exe 121 PID 3280 wrote to memory of 2768 3280 cmd.exe 121 PID 1776 wrote to memory of 3368 1776 Loader.exe 124 PID 1776 wrote to memory of 3368 1776 Loader.exe 124 PID 3368 wrote to memory of 4160 3368 cmd.exe 126 PID 3368 wrote to memory of 4160 3368 cmd.exe 126 PID 3932 wrote to memory of 4572 3932 Loader.exe 129 PID 3932 wrote to memory of 4572 3932 Loader.exe 129 PID 4572 wrote to memory of 2252 4572 cmd.exe 131 PID 4572 wrote to memory of 2252 4572 cmd.exe 131 PID 2272 wrote to memory of 2780 2272 Loader.exe 134 PID 2272 wrote to memory of 2780 2272 Loader.exe 134 PID 2780 wrote to memory of 4708 2780 cmd.exe 136 PID 2780 wrote to memory of 4708 2780 cmd.exe 136 PID 4528 wrote to memory of 2168 4528 Loader.exe 139 PID 4528 wrote to memory of 2168 4528 Loader.exe 139 PID 2168 wrote to memory of 4744 2168 cmd.exe 141 PID 2168 wrote to memory of 4744 2168 cmd.exe 141 PID 368 wrote to memory of 3388 368 Loader.exe 144 PID 368 wrote to memory of 3388 368 Loader.exe 144 PID 3388 wrote to memory of 2244 3388 cmd.exe 146 PID 3388 wrote to memory of 2244 3388 cmd.exe 146
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1404 -s 8762⤵
- Program crash
PID:548
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 1404 -ip 14041⤵PID:2632
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1016 -s 7082⤵
- Program crash
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 368 -s 8282⤵
- Program crash
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4528 -s 8322⤵
- Program crash
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3832 -s 8922⤵
- Program crash
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4656 -s 8362⤵
- Program crash
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2272 -s 8882⤵
- Program crash
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3932 -s 8442⤵
- Program crash
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1776 -s 8402⤵
- Program crash
PID:1376
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 1016 -ip 10161⤵PID:1708
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 3832 -ip 38321⤵PID:4984
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 384 -p 4656 -ip 46561⤵PID:2684
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 1776 -ip 17761⤵PID:4328
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 3932 -ip 39321⤵PID:1212
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 512 -p 2272 -ip 22721⤵PID:1656
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 4528 -ip 45281⤵PID:2716
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 368 -ip 3681⤵PID:4276
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4284
-
C:\Windows\System32\6l8ef4.exe"C:\Windows\System32\6l8ef4.exe"1⤵PID:3000
-
C:\Windows\System32\6l8ef4.exe"C:\Windows\System32\6l8ef4.exe"1⤵PID:1500
-
C:\Windows\System32\6l8ef4.exe"C:\Windows\System32\6l8ef4.exe"1⤵PID:1148