Analysis
-
max time kernel
300s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
16/01/2024, 13:52
Static task
static1
2 signatures
General
-
Target
OInstall.exe
-
Size
15.2MB
-
MD5
38be94769e4f59d9a90e551e505c2e07
-
SHA1
cac71ca2dd32cbe99614870ef01851e0d54bff84
-
SHA256
3a216b9390f1c46b8e49d43c63211a76e236510ef545eda83ddd8084f605f956
-
SHA512
47ef669a5be744235e10ba65d7deb8bdd46544cd6dc4532fa4b43fdc3b5d9b6b49febbef8906870b321281c47ca45f9b679e65eabfeffbf6deffc96fa27e24a5
-
SSDEEP
393216:J8/uxLqG0/kfQslis6SAVDfINRPcji3Zhtnh0:Bv0/kr8s6SA5QUji3ZhtnK
Malware Config
Extracted
Family
netwire
C2
qayshaija.ddns.net:1515
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/4596-52-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/4596-59-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/4596-61-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Checks BIOS information in registry 2 TTPs 64 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion install.exe -
Executes dropped EXE 64 IoCs
pid Process 3648 install.exe 4012 install.exe 916 install.exe 4220 install.exe 2120 install.exe 1632 install.exe 396 install.exe 2244 install.exe 3912 WerFault.exe 2820 install.exe 3840 install.exe 3336 install.exe 4564 install.exe 3904 install.exe 5028 install.exe 1848 install.exe 4664 install.exe 1496 install.exe 520 install.exe 3524 install.exe 5008 install.exe 2304 install.exe 2288 install.exe 5080 install.exe 2548 RegAsm.exe 1056 install.exe 2820 RegAsm.exe 4816 install.exe 1200 install.exe 2120 install.exe 4352 install.exe 2040 install.exe 3532 install.exe 2248 install.exe 1460 install.exe 5068 install.exe 3524 install.exe 4164 install.exe 4608 install.exe 2572 install.exe 204 install.exe 1328 install.exe 3836 install.exe 4132 install.exe 4608 install.exe 4400 install.exe 4660 install.exe 2868 install.exe 4992 install.exe 1192 install.exe 2148 install.exe 4140 install.exe 712 install.exe 2152 install.exe 4040 install.exe 5112 install.exe 4132 install.exe 1632 install.exe 1508 install.exe 1852 install.exe 1020 install.exe 4212 install.exe 4084 install.exe 4168 install.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3648 set thread context of 4596 3648 install.exe 101 PID 4012 set thread context of 2560 4012 install.exe 102 PID 4564 set thread context of 4128 4564 install.exe 106 PID 916 set thread context of 2868 916 install.exe 108 PID 3904 set thread context of 1604 3904 install.exe 112 PID 4220 set thread context of 4400 4220 install.exe 113 PID 2120 set thread context of 3644 2120 install.exe 117 PID 1632 set thread context of 2040 1632 install.exe 173 PID 396 set thread context of 200 396 install.exe 122 PID 2244 set thread context of 4384 2244 install.exe 128 PID 3912 set thread context of 3556 3912 WerFault.exe 129 PID 520 set thread context of 220 520 install.exe 132 PID 2820 set thread context of 712 2820 RegAsm.exe 135 PID 3524 set thread context of 3992 3524 install.exe 214 PID 3840 set thread context of 1348 3840 install.exe 139 PID 5008 set thread context of 4712 5008 install.exe 142 PID 3336 set thread context of 2324 3336 install.exe 144 PID 2304 set thread context of 3532 2304 install.exe 174 PID 5028 set thread context of 4808 5028 install.exe 155 PID 1848 set thread context of 4584 1848 install.exe 159 PID 4664 set thread context of 1456 4664 install.exe 164 PID 1496 set thread context of 4568 1496 install.exe 192 PID 2288 set thread context of 4440 2288 install.exe 178 PID 1460 set thread context of 3708 1460 install.exe 181 PID 5080 set thread context of 2960 5080 install.exe 209 PID 5068 set thread context of 1328 5068 install.exe 211 PID 2548 set thread context of 4084 2548 RegAsm.exe 189 PID 3524 set thread context of 4228 3524 install.exe 187 PID 1056 set thread context of 4104 1056 install.exe 190 PID 4164 set thread context of 4948 4164 install.exe 193 PID 2820 set thread context of 4192 2820 RegAsm.exe 194 PID 4608 set thread context of 2968 4608 install.exe 197 PID 4816 set thread context of 1108 4816 install.exe 198 PID 2572 set thread context of 2564 2572 install.exe 202 PID 1200 set thread context of 3572 1200 install.exe 204 PID 204 set thread context of 4032 204 install.exe 207 PID 2120 set thread context of 2960 2120 install.exe 209 PID 4352 set thread context of 2364 4352 install.exe 213 PID 1328 set thread context of 2548 1328 install.exe 212 PID 2040 set thread context of 3992 2040 install.exe 214 PID 3836 set thread context of 3540 3836 install.exe 217 PID 3532 set thread context of 364 3532 install.exe 219 PID 4132 set thread context of 2072 4132 install.exe 222 PID 2248 set thread context of 2820 2248 install.exe 223 PID 4608 set thread context of 644 4608 install.exe 245 PID 4400 set thread context of 3560 4400 install.exe 249 PID 4660 set thread context of 1080 4660 install.exe 252 PID 2868 set thread context of 2608 2868 install.exe 257 PID 4992 set thread context of 1108 4992 install.exe 260 PID 1192 set thread context of 5080 1192 install.exe 263 PID 2148 set thread context of 596 2148 install.exe 267 PID 4140 set thread context of 2556 4140 install.exe 270 PID 712 set thread context of 3604 712 install.exe 273 PID 2152 set thread context of 4364 2152 install.exe 277 PID 4040 set thread context of 4164 4040 install.exe 283 PID 5112 set thread context of 2608 5112 install.exe 284 PID 4132 set thread context of 1108 4132 install.exe 287 PID 1632 set thread context of 2596 1632 install.exe 292 PID 1508 set thread context of 5088 1508 install.exe 295 PID 1852 set thread context of 1876 1852 install.exe 300 PID 1020 set thread context of 4580 1020 install.exe 303 PID 4212 set thread context of 4500 4212 install.exe 306 PID 4084 set thread context of 4948 4084 install.exe 309 PID 4168 set thread context of 2340 4168 install.exe 313 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 4380 4596 WerFault.exe 1312 2560 WerFault.exe 102 4732 4128 WerFault.exe 106 3572 2868 WerFault.exe 108 1788 3556 WerFault.exe 129 3912 4808 WerFault.exe 155 -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName install.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3648 install.exe 4012 install.exe 4564 install.exe 916 install.exe 916 install.exe 3904 install.exe 4220 install.exe 2120 install.exe 1632 install.exe 396 install.exe 396 install.exe 396 install.exe 2244 install.exe 3912 WerFault.exe 3912 WerFault.exe 520 install.exe 2820 RegAsm.exe 3524 install.exe 3840 install.exe 3840 install.exe 5008 install.exe 3336 install.exe 3336 install.exe 2304 install.exe 5028 install.exe 1848 install.exe 4664 install.exe 1496 install.exe 2288 install.exe 1460 install.exe 5080 install.exe 5068 install.exe 2548 RegAsm.exe 3524 install.exe 1056 install.exe 4164 install.exe 2820 RegAsm.exe 4608 install.exe 4816 install.exe 4816 install.exe 2572 install.exe 1200 install.exe 1200 install.exe 204 install.exe 204 install.exe 2120 install.exe 4352 install.exe 1328 install.exe 2040 install.exe 3836 install.exe 3532 install.exe 3532 install.exe 4132 install.exe 2248 install.exe 4608 install.exe 4608 install.exe 4400 install.exe 4400 install.exe 4660 install.exe 2868 install.exe 4992 install.exe 1192 install.exe 1192 install.exe 2148 install.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3572 OInstall.exe 3572 OInstall.exe 3572 OInstall.exe 1200 OInstall.exe 1200 OInstall.exe 1200 OInstall.exe 3524 OInstall.exe 3524 OInstall.exe 3524 OInstall.exe 4400 OInstall.exe 4400 OInstall.exe 4400 OInstall.exe 3876 OInstall.exe 3876 OInstall.exe 3876 OInstall.exe 4252 OInstall.exe 4252 OInstall.exe 4252 OInstall.exe 4148 OInstall.exe 4148 OInstall.exe 4148 OInstall.exe 3408 OInstall.exe 3408 OInstall.exe 3408 OInstall.exe 3208 RegAsm.exe 3208 RegAsm.exe 3208 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 2968 RegAsm.exe 2968 RegAsm.exe 2968 RegAsm.exe 3136 OInstall.exe 3136 OInstall.exe 3136 OInstall.exe 4160 OInstall.exe 4160 OInstall.exe 4160 OInstall.exe 700 OInstall.exe 700 OInstall.exe 700 OInstall.exe 3240 OInstall.exe 3240 OInstall.exe 3240 OInstall.exe 4428 OInstall.exe 4428 OInstall.exe 4428 OInstall.exe 3092 OInstall.exe 3092 OInstall.exe 3092 OInstall.exe 4440 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 3732 OInstall.exe 3732 OInstall.exe 3732 OInstall.exe 4832 OInstall.exe 4832 OInstall.exe 4832 OInstall.exe 1444 OInstall.exe 1444 OInstall.exe 1444 OInstall.exe 992 OInstall.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3572 OInstall.exe 3572 OInstall.exe 3572 OInstall.exe 1200 OInstall.exe 1200 OInstall.exe 1200 OInstall.exe 3524 OInstall.exe 3524 OInstall.exe 3524 OInstall.exe 4400 OInstall.exe 4400 OInstall.exe 4400 OInstall.exe 3876 OInstall.exe 3876 OInstall.exe 3876 OInstall.exe 4252 OInstall.exe 4252 OInstall.exe 4252 OInstall.exe 4148 OInstall.exe 4148 OInstall.exe 4148 OInstall.exe 3408 OInstall.exe 3408 OInstall.exe 3408 OInstall.exe 3208 RegAsm.exe 3208 RegAsm.exe 3208 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 2968 RegAsm.exe 2968 RegAsm.exe 2968 RegAsm.exe 3136 OInstall.exe 3136 OInstall.exe 3136 OInstall.exe 4160 OInstall.exe 4160 OInstall.exe 4160 OInstall.exe 700 OInstall.exe 700 OInstall.exe 700 OInstall.exe 3240 OInstall.exe 3240 OInstall.exe 3240 OInstall.exe 4428 OInstall.exe 4428 OInstall.exe 4428 OInstall.exe 3092 OInstall.exe 3092 OInstall.exe 3092 OInstall.exe 4440 RegAsm.exe 4440 RegAsm.exe 4440 RegAsm.exe 3732 OInstall.exe 3732 OInstall.exe 3732 OInstall.exe 4832 OInstall.exe 4832 OInstall.exe 4832 OInstall.exe 1444 OInstall.exe 1444 OInstall.exe 1444 OInstall.exe 992 OInstall.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1200 3572 OInstall.exe 74 PID 3572 wrote to memory of 1200 3572 OInstall.exe 74 PID 3572 wrote to memory of 1200 3572 OInstall.exe 74 PID 3572 wrote to memory of 3648 3572 OInstall.exe 76 PID 3572 wrote to memory of 3648 3572 OInstall.exe 76 PID 3572 wrote to memory of 3648 3572 OInstall.exe 76 PID 1200 wrote to memory of 3524 1200 OInstall.exe 77 PID 1200 wrote to memory of 3524 1200 OInstall.exe 77 PID 1200 wrote to memory of 3524 1200 OInstall.exe 77 PID 1200 wrote to memory of 4012 1200 OInstall.exe 78 PID 1200 wrote to memory of 4012 1200 OInstall.exe 78 PID 1200 wrote to memory of 4012 1200 OInstall.exe 78 PID 3524 wrote to memory of 4400 3524 OInstall.exe 79 PID 3524 wrote to memory of 4400 3524 OInstall.exe 79 PID 3524 wrote to memory of 4400 3524 OInstall.exe 79 PID 3524 wrote to memory of 916 3524 OInstall.exe 80 PID 3524 wrote to memory of 916 3524 OInstall.exe 80 PID 3524 wrote to memory of 916 3524 OInstall.exe 80 PID 4400 wrote to memory of 3876 4400 OInstall.exe 81 PID 4400 wrote to memory of 3876 4400 OInstall.exe 81 PID 4400 wrote to memory of 3876 4400 OInstall.exe 81 PID 4400 wrote to memory of 4220 4400 OInstall.exe 82 PID 4400 wrote to memory of 4220 4400 OInstall.exe 82 PID 4400 wrote to memory of 4220 4400 OInstall.exe 82 PID 3876 wrote to memory of 4252 3876 OInstall.exe 83 PID 3876 wrote to memory of 4252 3876 OInstall.exe 83 PID 3876 wrote to memory of 4252 3876 OInstall.exe 83 PID 3876 wrote to memory of 2120 3876 OInstall.exe 84 PID 3876 wrote to memory of 2120 3876 OInstall.exe 84 PID 3876 wrote to memory of 2120 3876 OInstall.exe 84 PID 4252 wrote to memory of 4148 4252 OInstall.exe 85 PID 4252 wrote to memory of 4148 4252 OInstall.exe 85 PID 4252 wrote to memory of 4148 4252 OInstall.exe 85 PID 4252 wrote to memory of 1632 4252 OInstall.exe 86 PID 4252 wrote to memory of 1632 4252 OInstall.exe 86 PID 4252 wrote to memory of 1632 4252 OInstall.exe 86 PID 4148 wrote to memory of 3408 4148 OInstall.exe 87 PID 4148 wrote to memory of 3408 4148 OInstall.exe 87 PID 4148 wrote to memory of 3408 4148 OInstall.exe 87 PID 4148 wrote to memory of 396 4148 OInstall.exe 88 PID 4148 wrote to memory of 396 4148 OInstall.exe 88 PID 4148 wrote to memory of 396 4148 OInstall.exe 88 PID 3408 wrote to memory of 3208 3408 OInstall.exe 89 PID 3408 wrote to memory of 3208 3408 OInstall.exe 89 PID 3408 wrote to memory of 3208 3408 OInstall.exe 89 PID 3408 wrote to memory of 2244 3408 OInstall.exe 90 PID 3408 wrote to memory of 2244 3408 OInstall.exe 90 PID 3408 wrote to memory of 2244 3408 OInstall.exe 90 PID 3208 wrote to memory of 4440 3208 RegAsm.exe 178 PID 3208 wrote to memory of 4440 3208 RegAsm.exe 178 PID 3208 wrote to memory of 4440 3208 RegAsm.exe 178 PID 3208 wrote to memory of 3912 3208 RegAsm.exe 156 PID 3208 wrote to memory of 3912 3208 RegAsm.exe 156 PID 3208 wrote to memory of 3912 3208 RegAsm.exe 156 PID 4440 wrote to memory of 2968 4440 RegAsm.exe 197 PID 4440 wrote to memory of 2968 4440 RegAsm.exe 197 PID 4440 wrote to memory of 2968 4440 RegAsm.exe 197 PID 4440 wrote to memory of 2820 4440 RegAsm.exe 160 PID 4440 wrote to memory of 2820 4440 RegAsm.exe 160 PID 4440 wrote to memory of 2820 4440 RegAsm.exe 160 PID 2968 wrote to memory of 3136 2968 RegAsm.exe 95 PID 2968 wrote to memory of 3136 2968 RegAsm.exe 95 PID 2968 wrote to memory of 3136 2968 RegAsm.exe 95 PID 2968 wrote to memory of 3840 2968 RegAsm.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"5⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"6⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"7⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"8⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"9⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"10⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"11⤵PID:2820
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"12⤵PID:712
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"11⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:3336 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"14⤵PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"13⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:700 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3904 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"16⤵PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"17⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 56818⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Program crash
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:3912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"16⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"18⤵PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"18⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"20⤵PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"19⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"20⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"21⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"23⤵PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"22⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:992 -
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"23⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"25⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"24⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"25⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5080 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"26⤵PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"25⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"26⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"28⤵PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"27⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"28⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"29⤵PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"28⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"29⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4816 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"30⤵PID:1108
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"30⤵PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"29⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1200 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"31⤵PID:4252
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"31⤵PID:3572
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"30⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"32⤵PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"31⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: MapViewOfSection
PID:4352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"33⤵PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"32⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"33⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"35⤵PID:5112
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"35⤵PID:364
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"34⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"35⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"36⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"37⤵PID:96
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"38⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3524 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"39⤵PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"38⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"40⤵PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"39⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"40⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"41⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2572 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe"42⤵PID:2564
-
-
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"41⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"42⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"43⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"44⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"45⤵PID:68
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"46⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"47⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"48⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"49⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"50⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"51⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"52⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"53⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"54⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"55⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"56⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"57⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"58⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"59⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"60⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"61⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"62⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"63⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"64⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"65⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"66⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"67⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"68⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"69⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"70⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"71⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"72⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"73⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"74⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"75⤵PID:68
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"76⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"77⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"78⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"79⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"80⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"81⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"82⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"83⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"84⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"85⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"86⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"87⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"88⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"89⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"90⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"91⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"92⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"93⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"94⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"95⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"96⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"97⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"98⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"99⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"100⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"101⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"102⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"103⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"104⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"105⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"106⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"107⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"108⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"109⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"110⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"111⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"112⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"113⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"114⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"115⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"116⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"117⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"118⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"119⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"120⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"121⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\OInstall.exe"122⤵PID:4004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-