Analysis
-
max time kernel
6s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
7ed54bbd1207ed3660f9bf544676bb58.exe
Resource
win7-20231129-en
General
-
Target
7ed54bbd1207ed3660f9bf544676bb58.exe
-
Size
18KB
-
MD5
7ed54bbd1207ed3660f9bf544676bb58
-
SHA1
fb9570c2a560f26e68185e79da916ab77b0978a2
-
SHA256
01b3fa1094d23123c7e5dfd22e8aa1b27d6fb9ce8d1efce1d950f27bc9938b38
-
SHA512
82e397f24cd2d49e01a5858f37d6bffe96e03ae06cb8032234e8fa88e589351a1343824b0d2250b237aac3df6081b866185d4c4c7c68e3b59d6ce9969f1efa75
-
SSDEEP
384:IO76Fphlmx9qocoNjbZNY52eND9qytjnZibZnAOchTO7/RRK6jQf:yPhoNjbXY5aAjnZibtD0O7ZRo
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 692 zscqahlp.exe 2872 zscqahlp.exe 1172 zscqahlp.exe 4848 zscqahlp.exe 4928 zscqahlp.exe 5008 zscqahlp.exe 5096 zscqahlp.exe -
Loads dropped DLL 14 IoCs
pid Process 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 692 zscqahlp.exe 692 zscqahlp.exe 2872 zscqahlp.exe 2872 zscqahlp.exe 1172 zscqahlp.exe 1172 zscqahlp.exe 4848 zscqahlp.exe 4848 zscqahlp.exe 4928 zscqahlp.exe 4928 zscqahlp.exe 5008 zscqahlp.exe 5008 zscqahlp.exe -
Installs/modifies Browser Helper Object 2 TTPs 16 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} 7ed54bbd1207ed3660f9bf544676bb58.exe -
Drops file in System32 directory 35 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File created C:\Windows\SysWOW64\zscqahlp.exe 7ed54bbd1207ed3660f9bf544676bb58.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07} 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" 7ed54bbd1207ed3660f9bf544676bb58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 7ed54bbd1207ed3660f9bf544676bb58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 692 zscqahlp.exe 692 zscqahlp.exe 2872 zscqahlp.exe 2872 zscqahlp.exe 1172 zscqahlp.exe 1172 zscqahlp.exe 4848 zscqahlp.exe 4848 zscqahlp.exe 4928 zscqahlp.exe 4928 zscqahlp.exe 5008 zscqahlp.exe 5008 zscqahlp.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2368 7ed54bbd1207ed3660f9bf544676bb58.exe Token: SeDebugPrivilege 692 zscqahlp.exe Token: SeDebugPrivilege 2872 zscqahlp.exe Token: SeDebugPrivilege 1172 zscqahlp.exe Token: SeDebugPrivilege 4848 zscqahlp.exe Token: SeDebugPrivilege 4928 zscqahlp.exe Token: SeDebugPrivilege 5008 zscqahlp.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2760 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 28 PID 2368 wrote to memory of 2760 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 28 PID 2368 wrote to memory of 2760 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 28 PID 2368 wrote to memory of 2760 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 28 PID 2368 wrote to memory of 692 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 30 PID 2368 wrote to memory of 692 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 30 PID 2368 wrote to memory of 692 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 30 PID 2368 wrote to memory of 692 2368 7ed54bbd1207ed3660f9bf544676bb58.exe 30 PID 692 wrote to memory of 2072 692 zscqahlp.exe 31 PID 692 wrote to memory of 2072 692 zscqahlp.exe 31 PID 692 wrote to memory of 2072 692 zscqahlp.exe 31 PID 692 wrote to memory of 2072 692 zscqahlp.exe 31 PID 692 wrote to memory of 2872 692 zscqahlp.exe 36 PID 692 wrote to memory of 2872 692 zscqahlp.exe 36 PID 692 wrote to memory of 2872 692 zscqahlp.exe 36 PID 692 wrote to memory of 2872 692 zscqahlp.exe 36 PID 2872 wrote to memory of 792 2872 zscqahlp.exe 33 PID 2872 wrote to memory of 792 2872 zscqahlp.exe 33 PID 2872 wrote to memory of 792 2872 zscqahlp.exe 33 PID 2872 wrote to memory of 792 2872 zscqahlp.exe 33 PID 2872 wrote to memory of 1172 2872 zscqahlp.exe 35 PID 2872 wrote to memory of 1172 2872 zscqahlp.exe 35 PID 2872 wrote to memory of 1172 2872 zscqahlp.exe 35 PID 2872 wrote to memory of 1172 2872 zscqahlp.exe 35 PID 1172 wrote to memory of 3068 1172 zscqahlp.exe 38 PID 1172 wrote to memory of 3068 1172 zscqahlp.exe 38 PID 1172 wrote to memory of 3068 1172 zscqahlp.exe 38 PID 1172 wrote to memory of 3068 1172 zscqahlp.exe 38 PID 1172 wrote to memory of 4848 1172 zscqahlp.exe 39 PID 1172 wrote to memory of 4848 1172 zscqahlp.exe 39 PID 1172 wrote to memory of 4848 1172 zscqahlp.exe 39 PID 1172 wrote to memory of 4848 1172 zscqahlp.exe 39 PID 4848 wrote to memory of 4896 4848 zscqahlp.exe 40 PID 4848 wrote to memory of 4896 4848 zscqahlp.exe 40 PID 4848 wrote to memory of 4896 4848 zscqahlp.exe 40 PID 4848 wrote to memory of 4896 4848 zscqahlp.exe 40 PID 4848 wrote to memory of 4928 4848 zscqahlp.exe 54 PID 4848 wrote to memory of 4928 4848 zscqahlp.exe 54 PID 4848 wrote to memory of 4928 4848 zscqahlp.exe 54 PID 4848 wrote to memory of 4928 4848 zscqahlp.exe 54 PID 4928 wrote to memory of 4988 4928 zscqahlp.exe 52 PID 4928 wrote to memory of 4988 4928 zscqahlp.exe 52 PID 4928 wrote to memory of 4988 4928 zscqahlp.exe 52 PID 4928 wrote to memory of 4988 4928 zscqahlp.exe 52 PID 4928 wrote to memory of 5008 4928 zscqahlp.exe 50 PID 4928 wrote to memory of 5008 4928 zscqahlp.exe 50 PID 4928 wrote to memory of 5008 4928 zscqahlp.exe 50 PID 4928 wrote to memory of 5008 4928 zscqahlp.exe 50 PID 5008 wrote to memory of 5072 5008 zscqahlp.exe 49 PID 5008 wrote to memory of 5072 5008 zscqahlp.exe 49 PID 5008 wrote to memory of 5072 5008 zscqahlp.exe 49 PID 5008 wrote to memory of 5072 5008 zscqahlp.exe 49 PID 5008 wrote to memory of 5096 5008 zscqahlp.exe 41 PID 5008 wrote to memory of 5096 5008 zscqahlp.exe 41 PID 5008 wrote to memory of 5096 5008 zscqahlp.exe 41 PID 5008 wrote to memory of 5096 5008 zscqahlp.exe 41 PID 5096 wrote to memory of 2756 5096 zscqahlp.exe 43 PID 5096 wrote to memory of 2756 5096 zscqahlp.exe 43 PID 5096 wrote to memory of 2756 5096 zscqahlp.exe 43 PID 5096 wrote to memory of 2756 5096 zscqahlp.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ed54bbd1207ed3660f9bf544676bb58.exe"C:\Users\Admin\AppData\Local\Temp\7ed54bbd1207ed3660f9bf544676bb58.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259394796.bat2⤵PID:2760
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259395108.bat3⤵PID:2072
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259425715.bat4⤵PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259425700.bat3⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259425637.bat2⤵PID:2572
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259395124.bat1⤵PID:792
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259395170.bat2⤵PID:3068
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259399507.bat3⤵PID:4896
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259430910.bat4⤵PID:5708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259430193.bat3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259430239.bat2⤵PID:5620
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe1⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259401379.bat2⤵PID:2756
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe2⤵PID:2216
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe3⤵PID:5828
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259402768.bat4⤵PID:5912
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe4⤵PID:5932
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259402814.bat5⤵PID:5996
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe5⤵PID:5696
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259410115.bat6⤵PID:5756
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe6⤵PID:5784
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259410505.bat7⤵PID:5892
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe7⤵PID:5636
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259416839.bat8⤵PID:5612
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe8⤵PID:5744
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259417307.bat9⤵PID:5836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe9⤵PID:3920
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259427494.bat10⤵PID:4480
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe10⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259427884.bat11⤵PID:4884
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe11⤵PID:2628
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259428243.bat12⤵PID:5436
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe12⤵PID:5816
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259431300.bat13⤵PID:1588
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe13⤵PID:3588
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259433375.bat14⤵PID:3508
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe14⤵PID:3944
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259434701.bat15⤵PID:1996
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe15⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259443624.bat16⤵PID:2320
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe16⤵PID:5928
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259447633.bat17⤵PID:4476
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe17⤵PID:6492
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259448164.bat18⤵PID:6592
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe18⤵PID:3452
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259452501.bat19⤵PID:3156
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe19⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259454482.bat20⤵PID:1692
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe20⤵PID:6040
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259457961.bat21⤵PID:4624
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe21⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259466322.bat22⤵PID:2752
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe22⤵PID:5132
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259471564.bat23⤵PID:4968
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe23⤵PID:6024
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259473530.bat24⤵PID:4084
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe24⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259474013.bat25⤵PID:4520
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe25⤵PID:5228
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259475604.bat26⤵PID:6692
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe26⤵PID:6216
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259476213.bat27⤵PID:6176
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe27⤵PID:4500
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259476696.bat28⤵PID:4984
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe28⤵PID:576
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259477086.bat29⤵PID:1772
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe29⤵PID:4368
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259478366.bat30⤵PID:3552
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe30⤵PID:3624
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259480721.bat31⤵PID:332
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe31⤵PID:4200
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259482749.bat32⤵PID:3748
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe32⤵PID:6084
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259483280.bat33⤵PID:4292
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe33⤵PID:3684
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259484575.bat34⤵PID:1540
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe34⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259485245.bat35⤵PID:988
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe35⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259493623.bat36⤵PID:6804
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe36⤵PID:3296
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259494403.bat37⤵PID:1988
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe37⤵PID:3944
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259497133.bat38⤵PID:3452
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe38⤵PID:6832
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259497569.bat39⤵PID:5400
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe39⤵PID:6780
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259499005.bat40⤵PID:3348
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe40⤵PID:3288
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259499878.bat41⤵PID:4996
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe41⤵PID:5864
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259500705.bat42⤵PID:7052
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe42⤵PID:5360
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259501282.bat43⤵PID:4836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe43⤵PID:4508
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259504199.bat44⤵PID:3860
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe44⤵PID:6016
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259504621.bat45⤵PID:7124
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe45⤵PID:6208
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259509550.bat46⤵PID:5388
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe46⤵PID:6252
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259512842.bat47⤵PID:3012
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe47⤵PID:5188
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259518848.bat48⤵PID:4208
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe48⤵PID:6584
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259520065.bat49⤵PID:4980
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe49⤵PID:7092
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259522202.bat50⤵PID:2448
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe50⤵PID:4204
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259522670.bat51⤵PID:6860
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe51⤵PID:5692
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259524043.bat52⤵PID:448
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe52⤵PID:1208
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259524542.bat53⤵PID:784
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe53⤵PID:3404
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259526710.bat54⤵PID:4064
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe54⤵PID:4960
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259530798.bat55⤵PID:2836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe55⤵PID:1452
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259538208.bat56⤵PID:3804
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe56⤵PID:4608
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259543917.bat57⤵PID:5260
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259543902.bat46⤵PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259540033.bat45⤵PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259535836.bat44⤵PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259535524.bat43⤵PID:6528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259531936.bat42⤵PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259531281.bat41⤵PID:6288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259530595.bat40⤵PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259530018.bat39⤵PID:5332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259529191.bat38⤵PID:5824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259527818.bat37⤵PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259524776.bat36⤵PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259523731.bat35⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259515884.bat34⤵PID:3596
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259515120.bat33⤵PID:5468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259514012.bat32⤵PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259513326.bat31⤵PID:4904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259512109.bat30⤵PID:6360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259509223.bat29⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259507959.bat28⤵PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259507928.bat27⤵PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259506898.bat26⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259505385.bat25⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259504699.bat24⤵PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259503669.bat23⤵PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259501485.bat22⤵PID:916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259495214.bat21⤵PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259485838.bat20⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259485230.bat19⤵PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259483139.bat18⤵PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259479427.bat17⤵PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259478366.bat16⤵PID:6672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259470862.bat15⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259470815.bat14⤵PID:4080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259464185.bat13⤵PID:5356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259463374.bat12⤵PID:700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259459552.bat11⤵PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259458460.bat10⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259458460.bat9⤵PID:5968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259448133.bat8⤵PID:6540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259447306.bat7⤵PID:3800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259446744.bat6⤵PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259446744.bat5⤵PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259433531.bat4⤵PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259402190.bat3⤵PID:960
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259433016.bat3⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259432673.bat2⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259399960.bat1⤵PID:5072
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259430583.bat2⤵PID:5684
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259399804.bat1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD509517fc62284f33e877a276463580bd1
SHA10b14fe1db4493818f9de0bf2a56ee5370b8d479a
SHA2566cc6bbb1f3f754b6894d84130f5f2d86569ac3a603e1632d3cefa028f22b6238
SHA5121b924dd216d0f38199cc6df215e65ff260aa48fa37aa620dabcbc616f434643bd1f2e617d66b14bd52900214148741565128ba9589782ba582fd7308369f4a4d
-
Filesize
197B
MD5281c3532c929546d062bdfbd17ba582b
SHA1586ac3d8b0fad4d4befd3bc74eae158b13782027
SHA256b341c46ea0cc1d4a5add83945d430770d6ceba7d282b7b2d7d898d984bcf02d0
SHA5128d0f237a98c25da3605dfd08c69554d0101224f858d723909f3e33d036d0908bae1ecdd439b24dc74c3c53ab8aad8415a904d935ad4d11288cddb6db3d7cc5d1
-
Filesize
121B
MD5c2c0873091165aeac1ca8b123e633948
SHA100c5eded4d1d987c07591bc2cba9d24f8a1ca643
SHA2560eeb85cae44714f166d04bc76ffc4232001a4ab111b0bf3e89cb1efe94f49146
SHA512dbd1e6fda9d9bef507000c9d859b818569e61e493b83da93029232a36edca33f627f62b0d90cb72c062ff5f6d4c7b7e9153989b7b355bed7d7663ccd12a5be12
-
Filesize
242B
MD532cf344d4cbe7bd66daf54960f102543
SHA1791389f480801b3e255139e044192c40ebc198ca
SHA25606039815b122471c2e56e35cebe0bca734ba598a0fae8faffce2e851354023a2
SHA512da583215039e2880bd9c0871ddd34671dacbbec829f561cfa2556188a109f2ed9c5c0b554f897cb24153b29256f42607be0b372f128b3f77ff740a989b881995
-
Filesize
242B
MD5bba77befd78c001fbdd1074a771acd83
SHA122ac5ec37c8334118a6adf4c44de3f1193199db7
SHA2568ca13a1fa529446e99a1e16a3d51e74411e3c60b5753d8f871d58da5b742f299
SHA51279fbc7c3089f45ed03de2845b9653b11f0fcb4e486cd36ef23602d58e3a9cf1b6bcffbe56b64e8fc1b21ab948eafbb8d6c7b3e4eea2b32d456e807882d56e11f
-
Filesize
520B
MD561cbe45d5e3dfecb306ca0dc3a0f6b38
SHA1045102b121ca5642f2707e04c4358fefeb2c6643
SHA2560fcc14297ecc3c6ffa6fbd93693d39d9c7a9833f0b209f79286cafc2c9306624
SHA512194e2b49c02df02443f9d7fc1f0a4feee8389aa2daced9691da6f8db872342154fc5de1d92c201a0e755d135d237ba183f23d5990a0deb93b521e14a1646a61a
-
Filesize
4KB
MD5d9c12c9a841ee78c904dd8ba3405da8e
SHA1c552736131a13898987e1f774cdf63a2c643d1f5
SHA256f66d4a7e798fdab89ca5764bc9b1f4f4ac2c19c4c0125630d0b3b778dc143d1c
SHA5121c8a5a1e27c521772eb71ffdd92c8b8548be01fb84d25ddd2e58824a8f4cd278225d2ebedc3b94767e5744be76d1c6825c3c48cd654456dc5c74955d26af3df0
-
Filesize
526KB
MD50fdbc27053a30454d9feb3ff600d2d6c
SHA1edd1b4da5814dedcc6e69744b2751d3ad19a0910
SHA256dfbe7108d1d93f227c990c98746ed065b2beea1312ccec229ab05d827cb68796
SHA512d01e4a4c46fb090d107040ce0cb1058b66f2c6eb84455bca0e0feadb395c4c1be0d54cb872f2e57d68788888e79f458518ad708bde3ab2b7254ccca04c2d8c4b
-
Filesize
59KB
MD5692de318e5892910741ef7690a8d0ba1
SHA1037adf9f9a3a338c250bb42ae976f92ffdf0bcd5
SHA256534f871eb004c89d25a1f145d54af2f1f9d56f80c5047a7d572cfd1d8f992731
SHA5120ee61cb8cb2ee945a6abe7709f12b4a8a805adcdd53054ac06f73fc24e5f1e3bea7e7fde43078f820de158a9135056f348e75c704726693de321153ae0b26900
-
Filesize
526KB
MD5ab33a85a1a9037716dce70a6986f8c7a
SHA1ff0eeec5f7bbd2f9f32f5e2e20dec2281891a9d8
SHA256e112475517b92106c7c89a5c654d54670a7c92ae60f4d834b78c4ce57eede856
SHA51231f72c20244819f738009ea8b9930235ab1bcd937530a64f6157be5df9c66af7b6b239cbf886920105e81ba53b4c3fd06f695d5984ff242378dd3dd06ce635b6
-
Filesize
18KB
MD57ed54bbd1207ed3660f9bf544676bb58
SHA1fb9570c2a560f26e68185e79da916ab77b0978a2
SHA25601b3fa1094d23123c7e5dfd22e8aa1b27d6fb9ce8d1efce1d950f27bc9938b38
SHA51282e397f24cd2d49e01a5858f37d6bffe96e03ae06cb8032234e8fa88e589351a1343824b0d2250b237aac3df6081b866185d4c4c7c68e3b59d6ce9969f1efa75