Analysis
-
max time kernel
166s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 10:49
Behavioral task
behavioral1
Sample
45bfc0de3c78454b8c80623b7de965b0.exe
Resource
win7-20231215-en
General
-
Target
45bfc0de3c78454b8c80623b7de965b0.exe
-
Size
1.8MB
-
MD5
45bfc0de3c78454b8c80623b7de965b0
-
SHA1
e71476d4d3bff61d46c3999753d8e943c49d93d9
-
SHA256
cb971daad25ad430dd577b291694f096bb0b1a98cfc0482993ec30b69aa089df
-
SHA512
2d55abc2fef301061152da11be3ca05f2903c437db8fe023516a1e09242bb2aa4e9c13ca03337187a327727ea4fc1f1f8c7faaca8ed27248ff88a89eefff1b71
-
SSDEEP
24576:4kT+jH6bug8HIlszpJ0IeKVPJxqUdMKBcTGg58SQwZ0BVqO2kDrICz7ZW:4kT+WKriyGvK91WKBc6g+xBVXXrIkW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1308 svhostu.exe 3992 svhostu.exe 4920 bH6dWK7fR9TqUeI.exe 3400 GcS2ibD3pGaHdKf.exe 4312 hS1ibD3pn4Q6W7R.exe 4664 mS1ibD3on4Q6W7R.exe 3428 RpmG5aQJ6E8R9Yw.exe 4628 DA1uvD2on4m5W7.exe 5064 UxA1uvD2oFpHsJd.exe 4376 KEXwUVelOtPySiD.exe 2140 XfEL9gZqjCkVzNx.exe 4804 svhostu.exe 3584 RrlONtxP0c2b3n5.exe 4252 svhostu.exe 1076 svhostu.exe 1580 oycA1uvD2n4m5W7.exe 2156 svhostu.exe 492 svhostu.exe 228 cF4pH5sQJdLgZhC.exe 2076 svhostu.exe 3112 svhostu.exe 832 NcA1uvD2oFpHsJ.exe 1920 svhostu.exe 1640 svhostu.exe 520 pCwkrzONtAuSiFp.exe 3588 svhostu.exe 1772 svhostu.exe 5064 DA0ucS2ib3n5Qd.exe 1056 svhostu.exe 5036 svhostu.exe 1708 QF3pmG5aQ6E8RhX.exe 1936 svhostu.exe 4784 svhostu.exe 4716 TS2obF3pm5Q6.exe 2556 svhostu.exe 3940 svhostu.exe 2560 RonG4amH6W7E9Tq.exe 4992 svhostu.exe 2412 svhostu.exe 4572 JcA1ivD2oFaH.exe 3492 svhostu.exe 2876 svhostu.exe 1216 yqjYCekIVzN.exe 2712 svhostu.exe 4984 svhostu.exe 3292 xxA1uvS2oFpGsJd.exe 5064 svhostu.exe 2328 svhostu.exe 5052 c3pnGaH6dKfLhXj.exe 3096 svhostu.exe 2492 ZzONxA0uSoFp.exe 2564 svhostu.exe 2740 A5QJ7dEK8RqYwUr.exe 2704 svhostu.exe 4756 fsWJ7fEL9TqYeIz.exe 4340 svhostu.exe 4800 mUCelIBtzN.exe 184 svhostu.exe 916 pELTZqhCkVlNx0c.exe 1256 svhostu.exe 4540 VYCwkIVrO.exe 1380 svhostu.exe 732 j0uS2bD3pGaHdKf.exe 4384 svhostu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2204-1-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2204-4-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/files/0x000400000001e7e3-19.dat upx behavioral2/memory/2204-21-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4920-26-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3400-28-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3400-32-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4664-40-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4312-39-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4664-45-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3428-50-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/files/0x000200000001e801-49.dat upx behavioral2/memory/4628-52-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4628-56-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/5064-58-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/5064-66-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4376-68-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4376-72-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2140-85-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3584-87-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3584-103-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/1580-125-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/832-145-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/228-143-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/832-165-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/520-185-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/1708-205-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/5064-203-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/1708-224-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4716-225-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4716-238-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2560-239-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2560-252-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4572-253-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4572-265-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/1216-266-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/1216-279-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/3292-289-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/5052-291-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/5052-301-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2492-306-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/2740-317-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4756-319-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4756-327-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/4800-337-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/916-338-0x0000000000400000-0x00000000008AE000-memory.dmp upx behavioral2/memory/916-348-0x0000000000400000-0x00000000008AE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 59 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\REL8gTZqhCk8234A = "C:\\Windows\\system32\\DA1uvD2on4m5W7.exe" RpmG5aQJ6E8R9Yw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PfEL8gTZqYwIrO8234A = "C:\\Windows\\system32\\mUCelIBtzN.exe" fsWJ7fEL9TqYeIz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\thYXwkUVeO = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" mUCelIBtzN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YH6dWK7fR9TqUeI = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" Z8gRZ9hYXkVlBx0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rhYXwjUVeOtPySi = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" xxA1uvS2oFpGsJd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WRL9hTXwjClBzNc = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" c3pnGaH6dKfLhXj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pcA1ivD3oFaHsJf8234A = "C:\\Windows\\system32\\pELTZqhCkVlNx0c.exe" mUCelIBtzN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CrzONyxA1v2b4m8234A = "C:\\Windows\\system32\\pXqjYCekI.exe" Z8gRZ9hYXkVlBx0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OkIBrzPNyA8234A = "C:\\Windows\\system32\\mS1ibD3on4Q6W7R.exe" hS1ibD3pn4Q6W7R.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\txA0uvS2oFpGsJd8234A = "C:\\Windows\\system32\\yqjYCekIVzN.exe" JcA1ivD2oFaH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WGaQH6dW8R9T = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" JcA1ivD2oFaH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qTZqjYCekVzNx0v = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" yqjYCekIVzN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HWJ7fEL8gZjCkVz8234A = "C:\\Windows\\system32\\ztzPNycA1v2n4m5.exe" TCekIVrzOyAuSoF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NLgTZqjYCkVzNx0 = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" 45bfc0de3c78454b8c80623b7de965b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qUVelOBtz0c1v3n8234A = "C:\\Windows\\system32\\RpmG5aQJ6E8R9Yw.exe" mS1ibD3on4Q6W7R.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\U0uvS2obFpGsJdK8234A = "C:\\Windows\\system32\\XfEL9gZqjCkVzNx.exe" KEXwUVelOtPySiD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\P1uvD2onFpHsJdL = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" j0uS2bD3pGaHdKf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aEK8gRZ9hXkVlBx8234A = "C:\\Windows\\system32\\TS2obF3pm5Q6.exe" QF3pmG5aQ6E8RhX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LP0ycS1ib3n4Q6 = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" A5QJ7dEK8RqYwUr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EzPNyxA1uDoFp = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" pXqjYCekI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\O1uvS2obFpGsJ = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" NcA1uvD2oFpHsJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LK8fRZ9hTwU8234A = "C:\\Windows\\system32\\DA0ucS2ib3n5Qd.exe" pCwkrzONtAuSiFp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UEL8gTZqhCk = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" TS2obF3pm5Q6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qNyxA0uvSoFpGsJ8234A = "C:\\Windows\\system32\\fsWJ7fEL9TqYeIz.exe" A5QJ7dEK8RqYwUr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qtxAuvS2b3m5Q6E8234A = "C:\\Windows\\system32\\VYCwkIVrO.exe" pELTZqhCkVlNx0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qYCekIBrzNx1v2b8234A = "C:\\Windows\\system32\\RonG4amH6W7E9Tq.exe" TS2obF3pm5Q6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CNycA1uvDoFpHsJ = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" ZzONxA0uSoFp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sL9hTXwjUeItPyA8234A = "C:\\Windows\\system32\\GcS2ibD3pGaHdKf.exe" bH6dWK7fR9TqUeI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qQH6dWK8fLhXjCl8234A = "C:\\Windows\\system32\\RrlONtxP0c2b3n5.exe" XfEL9gZqjCkVzNx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CZqjYCwkIrOtAuS = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" XfEL9gZqjCkVzNx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PEKgRZhYXkVlBxy = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" pCwkrzONtAuSiFp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lzONyx1uS = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" RonG4amH6W7E9Tq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bOBtxP0uc1b3n4Q8234A = "C:\\Windows\\system32\\A5QJ7dEK8RqYwUr.exe" ZzONxA0uSoFp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eibD3pnG4Q68234A = "C:\\Windows\\system32\\shYXwkUVrOtPuS.exe" j0uS2bD3pGaHdKf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JK8RZqhYXkVlBPu8234A = "C:\\Windows\\system32\\xxA1uvS2oFpGsJd.exe" yqjYCekIVzN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tL8gRZqhYwUrOtP8234A = "C:\\Windows\\system32\\UxA1uvD2oFpHsJd.exe" DA1uvD2on4m5W7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GdEL8gTZqY8234A = "C:\\Windows\\system32\\NcA1uvD2oFpHsJ.exe" cF4pH5sQJdLgZhC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JWK7fRL9gjCIzNx = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" QF3pmG5aQ6E8RhX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PIBtzPNyc1v2n4m8234A = "C:\\Windows\\system32\\c3pnGaH6dKfLhXj.exe" xxA1uvS2oFpGsJd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\okUVrlONtPuSiDp8234A = "C:\\Windows\\system32\\cF4pH5sQJdLgZhC.exe" oycA1uvD2n4m5W7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\csWJ7fEL8TqYwIr8234A = "C:\\Windows\\system32\\JcA1ivD2oFaH.exe" RonG4amH6W7E9Tq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rYCekIBrzNx1v2b = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" pELTZqhCkVlNx0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kmG5sQJ6dKgZhXk8234A = "C:\\Windows\\system32\\TCekIVrzOyAuSoF.exe" pXqjYCekI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HNycA1uvDoFpHsJ8234A = "C:\\Windows\\system32\\bH6dWK7fR9TqUeI.exe" 45bfc0de3c78454b8c80623b7de965b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\djUVelOBtPySiDo8234A = "C:\\Windows\\system32\\QF3pmG5aQ6E8RhX.exe" DA0ucS2ib3n5Qd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kWK8fRL9hXjClBz = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" shYXwkUVrOtPuS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEL8gTZqhCkVlNx8234A = "C:\\Windows\\system32\\oycA1uvD2n4m5W7.exe" RrlONtxP0c2b3n5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\utxA0uvS2bp5Q6E = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" oycA1uvD2n4m5W7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LPycA1i3n4m6W7E = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" cF4pH5sQJdLgZhC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sG5aQJ6dE8R9Yw8234A = "C:\\Windows\\system32\\pCwkrzONtAuSiFp.exe" NcA1uvD2oFpHsJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rvS2ibF3p = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" VYCwkIVrO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pelIBrzPNc1v2n48234A = "C:\\Windows\\system32\\hS1ibD3pn4Q6W7R.exe" GcS2ibD3pGaHdKf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JItP0cA1i = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" RrlONtxP0c2b3n5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tG5sQJ6dE8R9YkV8234A = "C:\\Windows\\system32\\ZzONxA0uSoFp.exe" c3pnGaH6dKfLhXj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qwjUVelOBz0c1v3 = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" fsWJ7fEL9TqYeIz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wonG4amH6W7E9Tq8234A = "C:\\Windows\\system32\\KEXwUVelOtPySiD.exe" UxA1uvD2oFpHsJd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WZhYXwkUVlB0c1b = "C:\\Users\\Admin\\AppData\\Roaming\\svhostu.exe" DA0ucS2ib3n5Qd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ltzPNycA18234A = "C:\\Windows\\system32\\j0uS2bD3pGaHdKf.exe" VYCwkIVrO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jcS1ibD3oGaHsKf8234A = "C:\\Windows\\system32\\Z8gRZ9hYXkVlBx0.exe" shYXwkUVrOtPuS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 34 IoCs
description ioc Process File created C:\Windows\SysWOW64\xxA1uvS2oFpGsJd.exe yqjYCekIVzN.exe File created C:\Windows\SysWOW64\shYXwkUVrOtPuS.exe j0uS2bD3pGaHdKf.exe File created C:\Windows\SysWOW64\pXqjYCekI.exe Z8gRZ9hYXkVlBx0.exe File created C:\Windows\SysWOW64\TCekIVrzOyAuSoF.exe pXqjYCekI.exe File created C:\Windows\SysWOW64\UxA1uvD2oFpHsJd.exe DA1uvD2on4m5W7.exe File created C:\Windows\SysWOW64\XfEL9gZqjCkVzNx.exe KEXwUVelOtPySiD.exe File created C:\Windows\SysWOW64\yqjYCekIVzN.exe JcA1ivD2oFaH.exe File created C:\Windows\SysWOW64\cF4pH5sQJdLgZhC.exe oycA1uvD2n4m5W7.exe File created C:\Windows\SysWOW64\RonG4amH6W7E9Tq.exe TS2obF3pm5Q6.exe File created C:\Windows\SysWOW64\JcA1ivD2oFaH.exe RonG4amH6W7E9Tq.exe File created C:\Windows\SysWOW64\fsWJ7fEL9TqYeIz.exe A5QJ7dEK8RqYwUr.exe File created C:\Windows\SysWOW64\QF3pmG5aQ6E8RhX.exe DA0ucS2ib3n5Qd.exe File created C:\Windows\SysWOW64\c3pnGaH6dKfLhXj.exe xxA1uvS2oFpGsJd.exe File created C:\Windows\SysWOW64\ZzONxA0uSoFp.exe c3pnGaH6dKfLhXj.exe File created C:\Windows\SysWOW64\ztzPNycA1v2n4m5.exe TCekIVrzOyAuSoF.exe File created C:\Windows\SysWOW64\KEXwUVelOtPySiD.exe UxA1uvD2oFpHsJd.exe File created C:\Windows\SysWOW64\RrlONtxP0c2b3n5.exe XfEL9gZqjCkVzNx.exe File created C:\Windows\SysWOW64\A5QJ7dEK8RqYwUr.exe ZzONxA0uSoFp.exe File created C:\Windows\SysWOW64\RpmG5aQJ6E8R9Yw.exe mS1ibD3on4Q6W7R.exe File created C:\Windows\SysWOW64\oycA1uvD2n4m5W7.exe RrlONtxP0c2b3n5.exe File created C:\Windows\SysWOW64\NcA1uvD2oFpHsJ.exe cF4pH5sQJdLgZhC.exe File created C:\Windows\SysWOW64\DA0ucS2ib3n5Qd.exe pCwkrzONtAuSiFp.exe File created C:\Windows\SysWOW64\TS2obF3pm5Q6.exe QF3pmG5aQ6E8RhX.exe File created C:\Windows\SysWOW64\GcS2ibD3pGaHdKf.exe bH6dWK7fR9TqUeI.exe File created C:\Windows\SysWOW64\hS1ibD3pn4Q6W7R.exe GcS2ibD3pGaHdKf.exe File created C:\Windows\SysWOW64\mS1ibD3on4Q6W7R.exe hS1ibD3pn4Q6W7R.exe File created C:\Windows\SysWOW64\pELTZqhCkVlNx0c.exe mUCelIBtzN.exe File created C:\Windows\SysWOW64\j0uS2bD3pGaHdKf.exe VYCwkIVrO.exe File created C:\Windows\SysWOW64\mUCelIBtzN.exe fsWJ7fEL9TqYeIz.exe File created C:\Windows\SysWOW64\VYCwkIVrO.exe pELTZqhCkVlNx0c.exe File created C:\Windows\SysWOW64\Z8gRZ9hYXkVlBx0.exe shYXwkUVrOtPuS.exe File created C:\Windows\SysWOW64\bH6dWK7fR9TqUeI.exe 45bfc0de3c78454b8c80623b7de965b0.exe File created C:\Windows\SysWOW64\DA1uvD2on4m5W7.exe RpmG5aQJ6E8R9Yw.exe File created C:\Windows\SysWOW64\pCwkrzONtAuSiFp.exe NcA1uvD2oFpHsJ.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3212 5064 WerFault.exe 151 2844 5064 WerFault.exe 151 -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 2204 45bfc0de3c78454b8c80623b7de965b0.exe 4920 bH6dWK7fR9TqUeI.exe 3400 GcS2ibD3pGaHdKf.exe 4312 hS1ibD3pn4Q6W7R.exe 4664 mS1ibD3on4Q6W7R.exe 3428 RpmG5aQJ6E8R9Yw.exe 4628 DA1uvD2on4m5W7.exe 5064 UxA1uvD2oFpHsJd.exe 4376 KEXwUVelOtPySiD.exe 2140 XfEL9gZqjCkVzNx.exe 3584 RrlONtxP0c2b3n5.exe 1580 oycA1uvD2n4m5W7.exe 228 cF4pH5sQJdLgZhC.exe 832 NcA1uvD2oFpHsJ.exe 520 pCwkrzONtAuSiFp.exe 5064 DA0ucS2ib3n5Qd.exe 1708 QF3pmG5aQ6E8RhX.exe 4716 TS2obF3pm5Q6.exe 2560 RonG4amH6W7E9Tq.exe 4572 JcA1ivD2oFaH.exe 1216 yqjYCekIVzN.exe 3292 xxA1uvS2oFpGsJd.exe 5052 c3pnGaH6dKfLhXj.exe 2492 ZzONxA0uSoFp.exe 2740 A5QJ7dEK8RqYwUr.exe 4756 fsWJ7fEL9TqYeIz.exe 4800 mUCelIBtzN.exe 916 pELTZqhCkVlNx0c.exe 4540 VYCwkIVrO.exe 732 j0uS2bD3pGaHdKf.exe 2740 shYXwkUVrOtPuS.exe 3536 Z8gRZ9hYXkVlBx0.exe 2220 pXqjYCekI.exe 1308 TCekIVrzOyAuSoF.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1308 2204 45bfc0de3c78454b8c80623b7de965b0.exe 95 PID 2204 wrote to memory of 1308 2204 45bfc0de3c78454b8c80623b7de965b0.exe 95 PID 2204 wrote to memory of 1308 2204 45bfc0de3c78454b8c80623b7de965b0.exe 95 PID 2204 wrote to memory of 3992 2204 45bfc0de3c78454b8c80623b7de965b0.exe 97 PID 2204 wrote to memory of 3992 2204 45bfc0de3c78454b8c80623b7de965b0.exe 97 PID 2204 wrote to memory of 3992 2204 45bfc0de3c78454b8c80623b7de965b0.exe 97 PID 2204 wrote to memory of 4920 2204 45bfc0de3c78454b8c80623b7de965b0.exe 98 PID 2204 wrote to memory of 4920 2204 45bfc0de3c78454b8c80623b7de965b0.exe 98 PID 2204 wrote to memory of 4920 2204 45bfc0de3c78454b8c80623b7de965b0.exe 98 PID 4920 wrote to memory of 3400 4920 bH6dWK7fR9TqUeI.exe 99 PID 4920 wrote to memory of 3400 4920 bH6dWK7fR9TqUeI.exe 99 PID 4920 wrote to memory of 3400 4920 bH6dWK7fR9TqUeI.exe 99 PID 3400 wrote to memory of 4312 3400 GcS2ibD3pGaHdKf.exe 100 PID 3400 wrote to memory of 4312 3400 GcS2ibD3pGaHdKf.exe 100 PID 3400 wrote to memory of 4312 3400 GcS2ibD3pGaHdKf.exe 100 PID 4312 wrote to memory of 4664 4312 hS1ibD3pn4Q6W7R.exe 101 PID 4312 wrote to memory of 4664 4312 hS1ibD3pn4Q6W7R.exe 101 PID 4312 wrote to memory of 4664 4312 hS1ibD3pn4Q6W7R.exe 101 PID 4664 wrote to memory of 3428 4664 mS1ibD3on4Q6W7R.exe 103 PID 4664 wrote to memory of 3428 4664 mS1ibD3on4Q6W7R.exe 103 PID 4664 wrote to memory of 3428 4664 mS1ibD3on4Q6W7R.exe 103 PID 3428 wrote to memory of 4628 3428 RpmG5aQJ6E8R9Yw.exe 104 PID 3428 wrote to memory of 4628 3428 RpmG5aQJ6E8R9Yw.exe 104 PID 3428 wrote to memory of 4628 3428 RpmG5aQJ6E8R9Yw.exe 104 PID 4628 wrote to memory of 5064 4628 DA1uvD2on4m5W7.exe 105 PID 4628 wrote to memory of 5064 4628 DA1uvD2on4m5W7.exe 105 PID 4628 wrote to memory of 5064 4628 DA1uvD2on4m5W7.exe 105 PID 5064 wrote to memory of 4376 5064 UxA1uvD2oFpHsJd.exe 106 PID 5064 wrote to memory of 4376 5064 UxA1uvD2oFpHsJd.exe 106 PID 5064 wrote to memory of 4376 5064 UxA1uvD2oFpHsJd.exe 106 PID 4376 wrote to memory of 2140 4376 KEXwUVelOtPySiD.exe 107 PID 4376 wrote to memory of 2140 4376 KEXwUVelOtPySiD.exe 107 PID 4376 wrote to memory of 2140 4376 KEXwUVelOtPySiD.exe 107 PID 2140 wrote to memory of 4804 2140 XfEL9gZqjCkVzNx.exe 108 PID 2140 wrote to memory of 4804 2140 XfEL9gZqjCkVzNx.exe 108 PID 2140 wrote to memory of 4804 2140 XfEL9gZqjCkVzNx.exe 108 PID 2140 wrote to memory of 3584 2140 XfEL9gZqjCkVzNx.exe 109 PID 2140 wrote to memory of 3584 2140 XfEL9gZqjCkVzNx.exe 109 PID 2140 wrote to memory of 3584 2140 XfEL9gZqjCkVzNx.exe 109 PID 3584 wrote to memory of 4252 3584 RrlONtxP0c2b3n5.exe 110 PID 3584 wrote to memory of 4252 3584 RrlONtxP0c2b3n5.exe 110 PID 3584 wrote to memory of 4252 3584 RrlONtxP0c2b3n5.exe 110 PID 3584 wrote to memory of 1076 3584 RrlONtxP0c2b3n5.exe 111 PID 3584 wrote to memory of 1076 3584 RrlONtxP0c2b3n5.exe 111 PID 3584 wrote to memory of 1076 3584 RrlONtxP0c2b3n5.exe 111 PID 3584 wrote to memory of 1580 3584 RrlONtxP0c2b3n5.exe 112 PID 3584 wrote to memory of 1580 3584 RrlONtxP0c2b3n5.exe 112 PID 3584 wrote to memory of 1580 3584 RrlONtxP0c2b3n5.exe 112 PID 1580 wrote to memory of 2156 1580 oycA1uvD2n4m5W7.exe 113 PID 1580 wrote to memory of 2156 1580 oycA1uvD2n4m5W7.exe 113 PID 1580 wrote to memory of 2156 1580 oycA1uvD2n4m5W7.exe 113 PID 1580 wrote to memory of 492 1580 oycA1uvD2n4m5W7.exe 114 PID 1580 wrote to memory of 492 1580 oycA1uvD2n4m5W7.exe 114 PID 1580 wrote to memory of 492 1580 oycA1uvD2n4m5W7.exe 114 PID 1580 wrote to memory of 228 1580 oycA1uvD2n4m5W7.exe 115 PID 1580 wrote to memory of 228 1580 oycA1uvD2n4m5W7.exe 115 PID 1580 wrote to memory of 228 1580 oycA1uvD2n4m5W7.exe 115 PID 228 wrote to memory of 2076 228 cF4pH5sQJdLgZhC.exe 116 PID 228 wrote to memory of 2076 228 cF4pH5sQJdLgZhC.exe 116 PID 228 wrote to memory of 2076 228 cF4pH5sQJdLgZhC.exe 116 PID 228 wrote to memory of 3112 228 cF4pH5sQJdLgZhC.exe 117 PID 228 wrote to memory of 3112 228 cF4pH5sQJdLgZhC.exe 117 PID 228 wrote to memory of 3112 228 cF4pH5sQJdLgZhC.exe 117 PID 228 wrote to memory of 832 228 cF4pH5sQJdLgZhC.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\45bfc0de3c78454b8c80623b7de965b0.exe"C:\Users\Admin\AppData\Local\Temp\45bfc0de3c78454b8c80623b7de965b0.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"2⤵
- Executes dropped EXE
PID:1308
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto2⤵
- Executes dropped EXE
PID:3992
-
-
C:\Windows\SysWOW64\bH6dWK7fR9TqUeI.exeC:\Windows\system32\bH6dWK7fR9TqUeI.exe 5985C:\Users\Admin\AppData\Local\Temp\45bfc0de3c78454b8c80623b7de965b0.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\GcS2ibD3pGaHdKf.exeC:\Windows\system32\GcS2ibD3pGaHdKf.exe 5985C:\Windows\SysWOW64\bH6dWK7fR9TqUeI.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\hS1ibD3pn4Q6W7R.exeC:\Windows\system32\hS1ibD3pn4Q6W7R.exe 5985C:\Windows\SysWOW64\GcS2ibD3pGaHdKf.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\mS1ibD3on4Q6W7R.exeC:\Windows\system32\mS1ibD3on4Q6W7R.exe 5985C:\Windows\SysWOW64\hS1ibD3pn4Q6W7R.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\RpmG5aQJ6E8R9Yw.exeC:\Windows\system32\RpmG5aQJ6E8R9Yw.exe 5985C:\Windows\SysWOW64\mS1ibD3on4Q6W7R.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\DA1uvD2on4m5W7.exeC:\Windows\system32\DA1uvD2on4m5W7.exe 5985C:\Windows\SysWOW64\RpmG5aQJ6E8R9Yw.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\UxA1uvD2oFpHsJd.exeC:\Windows\system32\UxA1uvD2oFpHsJd.exe 5985C:\Windows\SysWOW64\DA1uvD2on4m5W7.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\KEXwUVelOtPySiD.exeC:\Windows\system32\KEXwUVelOtPySiD.exe 5985C:\Windows\SysWOW64\UxA1uvD2oFpHsJd.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\XfEL9gZqjCkVzNx.exeC:\Windows\system32\XfEL9gZqjCkVzNx.exe 5985C:\Windows\SysWOW64\KEXwUVelOtPySiD.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto11⤵
- Executes dropped EXE
PID:4804
-
-
C:\Windows\SysWOW64\RrlONtxP0c2b3n5.exeC:\Windows\system32\RrlONtxP0c2b3n5.exe 5985C:\Windows\SysWOW64\XfEL9gZqjCkVzNx.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"12⤵
- Executes dropped EXE
PID:4252
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto12⤵
- Executes dropped EXE
PID:1076
-
-
C:\Windows\SysWOW64\oycA1uvD2n4m5W7.exeC:\Windows\system32\oycA1uvD2n4m5W7.exe 5985C:\Windows\SysWOW64\RrlONtxP0c2b3n5.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"13⤵
- Executes dropped EXE
PID:2156
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto13⤵
- Executes dropped EXE
PID:492
-
-
C:\Windows\SysWOW64\cF4pH5sQJdLgZhC.exeC:\Windows\system32\cF4pH5sQJdLgZhC.exe 5985C:\Windows\SysWOW64\oycA1uvD2n4m5W7.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"14⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto14⤵
- Executes dropped EXE
PID:3112
-
-
C:\Windows\SysWOW64\NcA1uvD2oFpHsJ.exeC:\Windows\system32\NcA1uvD2oFpHsJ.exe 5985C:\Windows\SysWOW64\cF4pH5sQJdLgZhC.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"15⤵
- Executes dropped EXE
PID:1920
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto15⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\SysWOW64\pCwkrzONtAuSiFp.exeC:\Windows\system32\pCwkrzONtAuSiFp.exe 5985C:\Windows\SysWOW64\NcA1uvD2oFpHsJ.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"16⤵
- Executes dropped EXE
PID:3588
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto16⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\SysWOW64\DA0ucS2ib3n5Qd.exeC:\Windows\system32\DA0ucS2ib3n5Qd.exe 5985C:\Windows\SysWOW64\pCwkrzONtAuSiFp.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"17⤵
- Executes dropped EXE
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto17⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\QF3pmG5aQ6E8RhX.exeC:\Windows\system32\QF3pmG5aQ6E8RhX.exe 5985C:\Windows\SysWOW64\DA0ucS2ib3n5Qd.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"18⤵
- Executes dropped EXE
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto18⤵
- Executes dropped EXE
PID:4784
-
-
C:\Windows\SysWOW64\TS2obF3pm5Q6.exeC:\Windows\system32\TS2obF3pm5Q6.exe 5985C:\Windows\SysWOW64\QF3pmG5aQ6E8RhX.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"19⤵
- Executes dropped EXE
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto19⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\SysWOW64\RonG4amH6W7E9Tq.exeC:\Windows\system32\RonG4amH6W7E9Tq.exe 5985C:\Windows\SysWOW64\TS2obF3pm5Q6.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"20⤵
- Executes dropped EXE
PID:4992
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto20⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\SysWOW64\JcA1ivD2oFaH.exeC:\Windows\system32\JcA1ivD2oFaH.exe 5985C:\Windows\SysWOW64\RonG4amH6W7E9Tq.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"21⤵
- Executes dropped EXE
PID:3492
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto21⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\SysWOW64\yqjYCekIVzN.exeC:\Windows\system32\yqjYCekIVzN.exe 5985C:\Windows\SysWOW64\JcA1ivD2oFaH.exe21⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"22⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto22⤵
- Executes dropped EXE
PID:4984
-
-
C:\Windows\SysWOW64\xxA1uvS2oFpGsJd.exeC:\Windows\system32\xxA1uvS2oFpGsJd.exe 5985C:\Windows\SysWOW64\yqjYCekIVzN.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\svhostu.exe"C:\Users\Admin\AppData\Local\Temp\svhostu.exe"23⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 47224⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 47224⤵
- Program crash
PID:2844
-
-
-
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto23⤵
- Executes dropped EXE
PID:2328
-
-
C:\Windows\SysWOW64\c3pnGaH6dKfLhXj.exeC:\Windows\system32\c3pnGaH6dKfLhXj.exe 5985C:\Windows\SysWOW64\xxA1uvS2oFpGsJd.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto24⤵
- Executes dropped EXE
PID:3096
-
-
C:\Windows\SysWOW64\ZzONxA0uSoFp.exeC:\Windows\system32\ZzONxA0uSoFp.exe 5985C:\Windows\SysWOW64\c3pnGaH6dKfLhXj.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto25⤵
- Executes dropped EXE
PID:2564
-
-
C:\Windows\SysWOW64\A5QJ7dEK8RqYwUr.exeC:\Windows\system32\A5QJ7dEK8RqYwUr.exe 5985C:\Windows\SysWOW64\ZzONxA0uSoFp.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto26⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\SysWOW64\fsWJ7fEL9TqYeIz.exeC:\Windows\system32\fsWJ7fEL9TqYeIz.exe 5985C:\Windows\SysWOW64\A5QJ7dEK8RqYwUr.exe26⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto27⤵
- Executes dropped EXE
PID:4340
-
-
C:\Windows\SysWOW64\mUCelIBtzN.exeC:\Windows\system32\mUCelIBtzN.exe 5985C:\Windows\SysWOW64\fsWJ7fEL9TqYeIz.exe27⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4800 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto28⤵
- Executes dropped EXE
PID:184
-
-
C:\Windows\SysWOW64\pELTZqhCkVlNx0c.exeC:\Windows\system32\pELTZqhCkVlNx0c.exe 5985C:\Windows\SysWOW64\mUCelIBtzN.exe28⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto29⤵
- Executes dropped EXE
PID:1256
-
-
C:\Windows\SysWOW64\VYCwkIVrO.exeC:\Windows\system32\VYCwkIVrO.exe 5985C:\Windows\SysWOW64\pELTZqhCkVlNx0c.exe29⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4540 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto30⤵
- Executes dropped EXE
PID:1380
-
-
C:\Windows\SysWOW64\j0uS2bD3pGaHdKf.exeC:\Windows\system32\j0uS2bD3pGaHdKf.exe 5985C:\Windows\SysWOW64\VYCwkIVrO.exe30⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:732 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto31⤵
- Executes dropped EXE
PID:4384
-
-
C:\Windows\SysWOW64\shYXwkUVrOtPuS.exeC:\Windows\system32\shYXwkUVrOtPuS.exe 5985C:\Windows\SysWOW64\j0uS2bD3pGaHdKf.exe31⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto32⤵PID:2132
-
-
C:\Windows\SysWOW64\Z8gRZ9hYXkVlBx0.exeC:\Windows\system32\Z8gRZ9hYXkVlBx0.exe 5985C:\Windows\SysWOW64\shYXwkUVrOtPuS.exe32⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3536 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto33⤵PID:2024
-
-
C:\Windows\SysWOW64\pXqjYCekI.exeC:\Windows\system32\pXqjYCekI.exe 5985C:\Windows\SysWOW64\Z8gRZ9hYXkVlBx0.exe33⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Roaming\svhostu.exeC:\Users\Admin\AppData\Roaming\svhostu.exe auto34⤵PID:1588
-
-
C:\Windows\SysWOW64\TCekIVrzOyAuSoF.exeC:\Windows\system32\TCekIVrzOyAuSoF.exe 5985C:\Windows\SysWOW64\pXqjYCekI.exe34⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5064 -ip 50641⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5fad6e8ca8aa03b5624074d912d9ccf64
SHA1264ae840c5cd9229e3bef74fe99d77fb5ddd1b8c
SHA25612bad1d6ec0a7efe918ce1d6f32a9e15c2631361eff9e807f2d97cd29cb36daf
SHA512b318a2c79e9c3b823e601b4d16b692cd2370d7f75b74aa909b0ee91c0fe3ccded180a3028756dd2a0ce7c16c5ebd9a73ee523d2a6666c69826193e237fc14d20
-
Filesize
1.2MB
MD5cb3615ff34c7899ca7a3940de014d6a2
SHA1178ba180307394ab3f96c7b3aa49a1ca7d586f75
SHA2567958f1a019eeabf9b90eaac6c012a58d606e9796b928cb94c121e75fc129b92e
SHA512808f2b91d2a33166d10dc849efc60b879102ac95dd594739a63a577b208478efcea20164d642e94c8a7db523bb0d36ea205de01505798997edfddc3e2d560104
-
Filesize
1.8MB
MD545bfc0de3c78454b8c80623b7de965b0
SHA1e71476d4d3bff61d46c3999753d8e943c49d93d9
SHA256cb971daad25ad430dd577b291694f096bb0b1a98cfc0482993ec30b69aa089df
SHA5122d55abc2fef301061152da11be3ca05f2903c437db8fe023516a1e09242bb2aa4e9c13ca03337187a327727ea4fc1f1f8c7faaca8ed27248ff88a89eefff1b71