Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
15ce9e885610d5b85500ea0d139f6d21.exe
Resource
win7-20240221-en
General
-
Target
15ce9e885610d5b85500ea0d139f6d21.exe
-
Size
404KB
-
MD5
15ce9e885610d5b85500ea0d139f6d21
-
SHA1
99f1392185a70453f33e15d6f5b75064217c2c18
-
SHA256
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e
-
SHA512
9ee8e3fb682cf7abb5804106f841551f2f0fd8ace9842e67f3bda573772d39a6482d19e853de5a9a48d177350a3398cb814105ced01fdfb1be6db7e8bc9055b9
-
SSDEEP
6144:/IJTLRoSz47P8DiLdwXQIPcnEPjj9tQPBBpRPZi9opzUeqcnoKPcmPuJkJ:wlRoSz4j8DM6gIxfUP+2Ye9oCcmf
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/4468-93-0x0000000003F20000-0x000000000480B000-memory.dmp family_glupteba behavioral2/memory/1136-94-0x0000000003ED0000-0x00000000047BB000-memory.dmp family_glupteba behavioral2/memory/4468-109-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/1136-110-0x0000000003AC0000-0x0000000003EC5000-memory.dmp family_glupteba behavioral2/memory/1136-111-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/1136-215-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/960-399-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/228-418-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-497-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-508-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-567-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-572-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-581-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-647-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-652-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-656-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-661-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba behavioral2/memory/4772-666-0x0000000000400000-0x0000000001E06000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" lSS3BzDye3aTxNCsU2ewza0t.exe -
Processes:
15ce9e885610d5b85500ea0d139f6d21.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 15ce9e885610d5b85500ea0d139f6d21.exe -
Processes:
15ce9e885610d5b85500ea0d139f6d21.exelSS3BzDye3aTxNCsU2ewza0t.exeW8hglg70dB3ovhQOWhV1JRi6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\15ce9e885610d5b85500ea0d139f6d21.exe = "0" 15ce9e885610d5b85500ea0d139f6d21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" lSS3BzDye3aTxNCsU2ewza0t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 15ce9e885610d5b85500ea0d139f6d21.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lSS3BzDye3aTxNCsU2ewza0t.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2340 netsh.exe 2412 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lSS3BzDye3aTxNCsU2ewza0t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lSS3BzDye3aTxNCsU2ewza0t.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
15ce9e885610d5b85500ea0d139f6d21.exeKnCuzoHB6BpGE2sjuXnEMFco.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 15ce9e885610d5b85500ea0d139f6d21.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation KnCuzoHB6BpGE2sjuXnEMFco.exe -
Drops startup file 6 IoCs
Processes:
installutil.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BmL63bWEakuOXdVrpPUAuXjB.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ebkB5eZl0GzcVYXBkyzaaQrW.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GPpDmmKELXRUV4YPMaW0BbHF.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lZk17IfN6DWyhvaUMqhnqc7g.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ec8UGtsgVSHTNMqHD5VlCW9s.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2mRK1N2LcjqO7RgbLS1ieOSf.bat installutil.exe -
Executes dropped EXE 19 IoCs
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exeW8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.exeKnCuzoHB6BpGE2sjuXnEMFco.exeu1t4.0.exe7ZPTgmi4rec2kZu3ZscElViI.exeW8hglg70dB3ovhQOWhV1JRi6.execsrss.exeinjector.exewindefender.exewindefender.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exepid process 588 lSS3BzDye3aTxNCsU2ewza0t.exe 4468 W8hglg70dB3ovhQOWhV1JRi6.exe 1136 7ZPTgmi4rec2kZu3ZscElViI.exe 2344 KnCuzoHB6BpGE2sjuXnEMFco.exe 4800 u1t4.0.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 4772 csrss.exe 3604 injector.exe 228 windefender.exe 3992 windefender.exe 4460 kbFYjI5MikGXBvlHDwGDXc0F.exe 4256 kbFYjI5MikGXBvlHDwGDXc0F.exe 2024 kbFYjI5MikGXBvlHDwGDXc0F.exe 3392 kbFYjI5MikGXBvlHDwGDXc0F.exe 4800 kbFYjI5MikGXBvlHDwGDXc0F.exe 4896 Assistant_109.0.5097.45_Setup.exe_sfx.exe 3440 assistant_installer.exe 1092 assistant_installer.exe -
Loads dropped DLL 9 IoCs
Processes:
kbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exeassistant_installer.exeassistant_installer.exepid process 4460 kbFYjI5MikGXBvlHDwGDXc0F.exe 4256 kbFYjI5MikGXBvlHDwGDXc0F.exe 2024 kbFYjI5MikGXBvlHDwGDXc0F.exe 3392 kbFYjI5MikGXBvlHDwGDXc0F.exe 4800 kbFYjI5MikGXBvlHDwGDXc0F.exe 3440 assistant_installer.exe 3440 assistant_installer.exe 1092 assistant_installer.exe 1092 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/228-507-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3992-553-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3992-576-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
15ce9e885610d5b85500ea0d139f6d21.exelSS3BzDye3aTxNCsU2ewza0t.exeW8hglg70dB3ovhQOWhV1JRi6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\15ce9e885610d5b85500ea0d139f6d21.exe = "0" 15ce9e885610d5b85500ea0d139f6d21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" lSS3BzDye3aTxNCsU2ewza0t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 15ce9e885610d5b85500ea0d139f6d21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions 15ce9e885610d5b85500ea0d139f6d21.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
W8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
15ce9e885610d5b85500ea0d139f6d21.exelSS3BzDye3aTxNCsU2ewza0t.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 15ce9e885610d5b85500ea0d139f6d21.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lSS3BzDye3aTxNCsU2ewza0t.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15ce9e885610d5b85500ea0d139f6d21.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kbFYjI5MikGXBvlHDwGDXc0F.exekbFYjI5MikGXBvlHDwGDXc0F.exedescription ioc process File opened (read-only) \??\D: kbFYjI5MikGXBvlHDwGDXc0F.exe File opened (read-only) \??\F: kbFYjI5MikGXBvlHDwGDXc0F.exe File opened (read-only) \??\D: kbFYjI5MikGXBvlHDwGDXc0F.exe File opened (read-only) \??\F: kbFYjI5MikGXBvlHDwGDXc0F.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 69 ipinfo.io 71 ipinfo.io 10 api.myip.com 68 api.myip.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 14 IoCs
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI lSS3BzDye3aTxNCsU2ewza0t.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini lSS3BzDye3aTxNCsU2ewza0t.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol lSS3BzDye3aTxNCsU2ewza0t.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy lSS3BzDye3aTxNCsU2ewza0t.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
lSS3BzDye3aTxNCsU2ewza0t.exepid process 588 lSS3BzDye3aTxNCsU2ewza0t.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
15ce9e885610d5b85500ea0d139f6d21.exedescription pid process target process PID 212 set thread context of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
W8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN W8hglg70dB3ovhQOWhV1JRi6.exe File opened (read-only) \??\VBoxMiniRdrDN 7ZPTgmi4rec2kZu3ZscElViI.exe -
Drops file in Windows directory 6 IoCs
Processes:
W8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.execsrss.exedescription ioc process File opened for modification C:\Windows\rss W8hglg70dB3ovhQOWhV1JRi6.exe File created C:\Windows\rss\csrss.exe W8hglg70dB3ovhQOWhV1JRi6.exe File opened for modification C:\Windows\rss 7ZPTgmi4rec2kZu3ZscElViI.exe File created C:\Windows\rss\csrss.exe 7ZPTgmi4rec2kZu3ZscElViI.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 944 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3044 4800 WerFault.exe u1t4.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5024 schtasks.exe 2064 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
7ZPTgmi4rec2kZu3ZscElViI.exepowershell.exepowershell.exepowershell.exewindefender.exeW8hglg70dB3ovhQOWhV1JRi6.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 7ZPTgmi4rec2kZu3ZscElViI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" W8hglg70dB3ovhQOWhV1JRi6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Processes:
kbFYjI5MikGXBvlHDwGDXc0F.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 kbFYjI5MikGXBvlHDwGDXc0F.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f53000000010000007f000000307d3020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c009000000010000003e000000303c06082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030906082b0601050507030106082b060105050703080b0000000100000030000000440069006700690043006500720074002000420061006c00740069006d006f0072006500200052006f006f007400000062000000010000002000000016af57a9f676b0ab126095aa5ebadef22ab31119d644ac95cd4b93dbf3f26aeb140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c7f000000010000000c000000300a06082b060105050703097e000000010000000800000000c001b39667d601030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 kbFYjI5MikGXBvlHDwGDXc0F.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 kbFYjI5MikGXBvlHDwGDXc0F.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996190000000100000010000000ffac207997bb2cfe865570179ee037b92000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e kbFYjI5MikGXBvlHDwGDXc0F.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 kbFYjI5MikGXBvlHDwGDXc0F.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 kbFYjI5MikGXBvlHDwGDXc0F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeW8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.exepowershell.exepowershell.exeW8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.exepid process 2568 powershell.exe 2568 powershell.exe 1528 powershell.exe 1528 powershell.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe 1528 powershell.exe 4468 W8hglg70dB3ovhQOWhV1JRi6.exe 4468 W8hglg70dB3ovhQOWhV1JRi6.exe 1136 7ZPTgmi4rec2kZu3ZscElViI.exe 1136 7ZPTgmi4rec2kZu3ZscElViI.exe 2336 powershell.exe 2648 powershell.exe 2648 powershell.exe 2336 powershell.exe 2336 powershell.exe 2648 powershell.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 960 W8hglg70dB3ovhQOWhV1JRi6.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 228 7ZPTgmi4rec2kZu3ZscElViI.exe 1756 powershell.exe 1756 powershell.exe 1764 powershell.exe 1764 powershell.exe 1756 powershell.exe 1764 powershell.exe 2764 powershell.exe 2764 powershell.exe 2764 powershell.exe 3672 powershell.exe 3672 powershell.exe 3672 powershell.exe 1816 powershell.exe 1816 powershell.exe 1816 powershell.exe 4332 powershell.exe 4332 powershell.exe 4332 powershell.exe 224 powershell.exe 224 powershell.exe 224 powershell.exe 3604 injector.exe 3604 injector.exe 3604 injector.exe 3604 injector.exe 3604 injector.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
15ce9e885610d5b85500ea0d139f6d21.exepowershell.exeinstallutil.exepowershell.exepowershell.exeW8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 212 15ce9e885610d5b85500ea0d139f6d21.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2936 installutil.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 4468 W8hglg70dB3ovhQOWhV1JRi6.exe Token: SeImpersonatePrivilege 4468 W8hglg70dB3ovhQOWhV1JRi6.exe Token: SeDebugPrivilege 1136 7ZPTgmi4rec2kZu3ZscElViI.exe Token: SeImpersonatePrivilege 1136 7ZPTgmi4rec2kZu3ZscElViI.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 1764 powershell.exe Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 3672 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeSystemEnvironmentPrivilege 4772 csrss.exe Token: SeSecurityPrivilege 944 sc.exe Token: SeSecurityPrivilege 944 sc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
15ce9e885610d5b85500ea0d139f6d21.exeinstallutil.exe7ZPTgmi4rec2kZu3ZscElViI.exeW8hglg70dB3ovhQOWhV1JRi6.exeKnCuzoHB6BpGE2sjuXnEMFco.exeW8hglg70dB3ovhQOWhV1JRi6.exe7ZPTgmi4rec2kZu3ZscElViI.execmd.execsrss.exedescription pid process target process PID 212 wrote to memory of 2568 212 15ce9e885610d5b85500ea0d139f6d21.exe powershell.exe PID 212 wrote to memory of 2568 212 15ce9e885610d5b85500ea0d139f6d21.exe powershell.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 212 wrote to memory of 2936 212 15ce9e885610d5b85500ea0d139f6d21.exe installutil.exe PID 2936 wrote to memory of 588 2936 installutil.exe lSS3BzDye3aTxNCsU2ewza0t.exe PID 2936 wrote to memory of 588 2936 installutil.exe lSS3BzDye3aTxNCsU2ewza0t.exe PID 2936 wrote to memory of 4468 2936 installutil.exe W8hglg70dB3ovhQOWhV1JRi6.exe PID 2936 wrote to memory of 4468 2936 installutil.exe W8hglg70dB3ovhQOWhV1JRi6.exe PID 2936 wrote to memory of 4468 2936 installutil.exe W8hglg70dB3ovhQOWhV1JRi6.exe PID 2936 wrote to memory of 1136 2936 installutil.exe 7ZPTgmi4rec2kZu3ZscElViI.exe PID 2936 wrote to memory of 1136 2936 installutil.exe 7ZPTgmi4rec2kZu3ZscElViI.exe PID 2936 wrote to memory of 1136 2936 installutil.exe 7ZPTgmi4rec2kZu3ZscElViI.exe PID 2936 wrote to memory of 2344 2936 installutil.exe KnCuzoHB6BpGE2sjuXnEMFco.exe PID 2936 wrote to memory of 2344 2936 installutil.exe KnCuzoHB6BpGE2sjuXnEMFco.exe PID 2936 wrote to memory of 2344 2936 installutil.exe KnCuzoHB6BpGE2sjuXnEMFco.exe PID 1136 wrote to memory of 1528 1136 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 1136 wrote to memory of 1528 1136 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 1136 wrote to memory of 1528 1136 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 4468 wrote to memory of 1060 4468 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 4468 wrote to memory of 1060 4468 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 4468 wrote to memory of 1060 4468 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 2344 wrote to memory of 4800 2344 KnCuzoHB6BpGE2sjuXnEMFco.exe u1t4.0.exe PID 2344 wrote to memory of 4800 2344 KnCuzoHB6BpGE2sjuXnEMFco.exe u1t4.0.exe PID 2344 wrote to memory of 4800 2344 KnCuzoHB6BpGE2sjuXnEMFco.exe u1t4.0.exe PID 960 wrote to memory of 2648 960 W8hglg70dB3ovhQOWhV1JRi6.exe Conhost.exe PID 960 wrote to memory of 2648 960 W8hglg70dB3ovhQOWhV1JRi6.exe Conhost.exe PID 960 wrote to memory of 2648 960 W8hglg70dB3ovhQOWhV1JRi6.exe Conhost.exe PID 228 wrote to memory of 2336 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 2336 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 2336 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 960 wrote to memory of 2992 960 W8hglg70dB3ovhQOWhV1JRi6.exe cmd.exe PID 960 wrote to memory of 2992 960 W8hglg70dB3ovhQOWhV1JRi6.exe cmd.exe PID 228 wrote to memory of 4004 228 7ZPTgmi4rec2kZu3ZscElViI.exe cmd.exe PID 228 wrote to memory of 4004 228 7ZPTgmi4rec2kZu3ZscElViI.exe cmd.exe PID 2992 wrote to memory of 2340 2992 cmd.exe netsh.exe PID 2992 wrote to memory of 2340 2992 cmd.exe netsh.exe PID 960 wrote to memory of 1756 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 960 wrote to memory of 1756 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 960 wrote to memory of 1756 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 228 wrote to memory of 1764 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 1764 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 1764 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 960 wrote to memory of 2764 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 960 wrote to memory of 2764 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 960 wrote to memory of 2764 960 W8hglg70dB3ovhQOWhV1JRi6.exe powershell.exe PID 228 wrote to memory of 3672 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 3672 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 228 wrote to memory of 3672 228 7ZPTgmi4rec2kZu3ZscElViI.exe powershell.exe PID 960 wrote to memory of 4772 960 W8hglg70dB3ovhQOWhV1JRi6.exe csrss.exe PID 960 wrote to memory of 4772 960 W8hglg70dB3ovhQOWhV1JRi6.exe csrss.exe PID 960 wrote to memory of 4772 960 W8hglg70dB3ovhQOWhV1JRi6.exe csrss.exe PID 4772 wrote to memory of 1816 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 1816 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 1816 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 4332 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 4332 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 4332 4772 csrss.exe powershell.exe PID 4772 wrote to memory of 224 4772 csrss.exe powershell.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
15ce9e885610d5b85500ea0d139f6d21.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 15ce9e885610d5b85500ea0d139f6d21.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ce9e885610d5b85500ea0d139f6d21.exe"C:\Users\Admin\AppData\Local\Temp\15ce9e885610d5b85500ea0d139f6d21.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\15ce9e885610d5b85500ea0d139f6d21.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\Pictures\lSS3BzDye3aTxNCsU2ewza0t.exe"C:\Users\Admin\Pictures\lSS3BzDye3aTxNCsU2ewza0t.exe"3⤵
- Modifies firewall policy service
- Windows security bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:588
-
-
C:\Users\Admin\Pictures\W8hglg70dB3ovhQOWhV1JRi6.exe"C:\Users\Admin\Pictures\W8hglg70dB3ovhQOWhV1JRi6.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Users\Admin\Pictures\W8hglg70dB3ovhQOWhV1JRi6.exe"C:\Users\Admin\Pictures\W8hglg70dB3ovhQOWhV1JRi6.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2340
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5024
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2064 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2648
-
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:3516
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\7ZPTgmi4rec2kZu3ZscElViI.exe"C:\Users\Admin\Pictures\7ZPTgmi4rec2kZu3ZscElViI.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Users\Admin\Pictures\7ZPTgmi4rec2kZu3ZscElViI.exe"C:\Users\Admin\Pictures\7ZPTgmi4rec2kZu3ZscElViI.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4004
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
-
C:\Users\Admin\Pictures\KnCuzoHB6BpGE2sjuXnEMFco.exe"C:\Users\Admin\Pictures\KnCuzoHB6BpGE2sjuXnEMFco.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\u1t4.0.exe"C:\Users\Admin\AppData\Local\Temp\u1t4.0.exe"4⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 10165⤵
- Program crash
PID:3044
-
-
-
-
C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe"C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:4460 -
C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exeC:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2a8,0x2ac,0x2b0,0x284,0x2b4,0x6fc7e1d0,0x6fc7e1dc,0x6fc7e1e84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kbFYjI5MikGXBvlHDwGDXc0F.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kbFYjI5MikGXBvlHDwGDXc0F.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024
-
-
C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe"C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4460 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240420095356" --session-guid=16c9430d-53f0-4646-9a68-4692fe288f10 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=68050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:3392 -
C:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exeC:\Users\Admin\Pictures\kbFYjI5MikGXBvlHDwGDXc0F.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2a0,0x2a4,0x2b4,0x274,0x2b8,0x6ea4e1d0,0x6ea4e1dc,0x6ea4e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x8c6038,0x8c6044,0x8c60505⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4800 -ip 48001⤵PID:4844
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51d7f3d1036cc09d2b9c5d8d5acfbb867
SHA15a76ade3e2ced7d72b6ce450b074d3c5aaa13b85
SHA2560725190ee120338da973024f3d633bd17d0009af194000fa0a91dde961a8d76c
SHA512dc993da2058b91cd4870b0e868963cadd68d0c03aee091691d7ed0a027215ef5114c9d56ec8d9e228cd7d022339d277903fc12481e2e00df758a3915a17d1fd8
-
Filesize
21KB
MD57e9b297cc4d2a7072ff17a33674e8f1b
SHA13a4e92843ac80174d9cbb4c9d8b288ec9aebddb0
SHA256f0f918ab9c0380d1d255e579cf97e8c7b5b10a4880173b431f01fcd4e369b0c4
SHA512a7bbdff5094777053fa6944391a2f20ab846277b716097d0df5de2a21ed650bc3b3468453a6bec973847fa26d0aa1bde6f2814145b60063a0eb714a643e8f300
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\additional_file0.tmp
Filesize2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\assistant_installer.exe
Filesize1.9MB
MD5976bc8e5fe65f9bb56831e20f1747150
SHA1f9e7f5628aaaabed9939ef055540e24590a9ccfb
SHA256f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0
SHA5122858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\dbgcore.dll
Filesize166KB
MD59ebb919b96f6f94e1be4cdc6913ef629
SHA131e99ac4fba516f82b36bd81784e8d518b32f9df
SHA256fdae21127deb16eb8ba36f2493d2255f4cb8ab4c18e8bd8ba5e587f5a7ecd119
SHA512a1b42f7d2896da270bb3c80cf9b88c4b4f1491084e7aa7760eeea5533b26f041dc79b21d5ffd2bba2221fe118e0a8d912e170f24fd895c9315b1ee9c7adfe700
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\assistant\dbghelp.dll
Filesize1.7MB
MD5544255258f9d45b4608ccfd27a4ed1dd
SHA1571e30ceb9c977817b5bbac306366ae59f773497
SHA2563b02fc85602e83059f611c658e3cad6bc59c3c51214d4fe7e31f3ac31388dd68
SHA5122093da881fa90eec2b90d1ca6eaaff608fe16ac612571a7fd5ed94dd5f7ff7e5c1e8c862bab0a228850829527886473e3942abd23a81d10cab8f9baad2cc7664
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404200953561\opera_package
Filesize103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
Filesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
353KB
MD531cb8ff276a0a394c3572a942fb623c3
SHA1e64b3f111a0cd572b201ecac2b3cab849b854a06
SHA256e80bfaa0b68c7040402915f2d057e7114f0a0b16ca3e36dcd937bf19341347e8
SHA512cd864f77c63943836a34e6daa52c4cc65bbd6c8bf064c841598dd12f48b65a0182ce8147ebd38f5aaf25196889b1e8d23a3c73fb9d4493a95199940f9786f1be
-
Filesize
40B
MD5bfa176fb1836a487b721d6ed57f390a1
SHA1213fd87cc8ae88da4ec975fd3b3b067f403d1d45
SHA256e7228d212f63452763c8735d27930aeafbda97e8f32561e23b685f0f719eeb1b
SHA512a78c3379c02028b72f35346d38fdaccd2fc32a8e6b5395f2416ce5d1df4876e573747aceaf94e7166e61a2634126e315ac58b3c6edcef1834186f475751f2a2b
-
Filesize
497KB
MD5dedd4ef7176809952c6b5b2492d4a972
SHA1770537e96bfbe3e2dc352af8dfe6edb8a8c971bd
SHA25653167ba94a450f8bcda36276b9d53687b52ec8852dff3397ba64f6efbfd4ec0e
SHA512189ff05c388569af1ea5f871a16ef8fdb332a1c5f04c04b2e8079560ea195fa61ec25f85bb4f793c7d89f0acdee54f77531ff02acaf728b6677e00a0fcbfbd41
-
Filesize
4.2MB
MD53b4f81a6c1cf0d18a0228d9b5797c1d1
SHA1a1bbeccb2e61c5fbd1ce35898418a5f95fb1130c
SHA256ef70e45cd7609f524ec2a8b4e03c846f637e6fbe04eaa46f6295609ee51f1302
SHA512e7979818b4790f8089cd5c5c7d61664f08e99ea7d809e73bc31f963db2bc67fc24af486a44313b8bc878f7bb569d2b60c841e6e2548c5be98b63a11abf6c50c9
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
5.1MB
MD5e678bcaaaa82cbb60a4cfa108f6a2924
SHA115ebda85a3eb97e587b8d56df4b0b64cd20e0d19
SHA2563ad68795686b9cb0ecb6d0f2f567596c71c0678882bfec72ae7df740d706bdb1
SHA51237daa3c8312794b46378cb5dc980b9909ab1718eedf8901789cb0d816950047602854acf4f0804b69313f061ad0d84a9669a19657851ab24074c85a3df943aad
-
Filesize
2.5MB
MD5749cb9cb3ce89a03fdd97a9aaf96e895
SHA173ecd478ace66e1dfb7aeed8ed061af48214a46f
SHA25685aeb0eca144912f0713ac4e8392e2645a91bb4ba8e2ffa55e5bf834665170af
SHA512ac0afac898ab53a3277b4d1aef90af246ca8596872a6a61bbf47817c1ea038fc4394094a4d14d2cc0aa94aeaf1435f9ccc7cf7143010ff581fd4256dc653bd31
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD580db1f2252dd2cfa72911a05e3ed349d
SHA19a968a989c9572a21fdfd6521fa8ceefd45d72bb
SHA25681fdd1fc842ca90e09fc054f3a7084970c7a0d412e2653727625e4551ddf8924
SHA51253ea11670988f9315e0adf8cb41f2d480c52a06e0d8b678bbd34e153e368f404490c8e9edd1ea73ea7c2a50ddfcd1414fc5dc5d588c7633da05a253c37198cd5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a6ce4b0fd2f6b6cea988a1dcf2a117a6
SHA1765506b551b90f5a96f2a28bf9aab31f9f0b4564
SHA256b69bcecc88bb5803febe632261765d0141a947e95cda3ecea3cfaaef846beadf
SHA5128a9e7253fcb3b18e4b5b713b063bb6cdc9f6258310e15f60f6b5a16bf69a0a5c45c82651daf1b651f1ee148a8ad9ad9c085bf3fb1c8ab50b3e7174ce6237bf0f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cbe1709df9026956d9dec2b0c215494f
SHA100e16bffdb1f795731b39b355779e680a7ceb291
SHA2563ad03f4b1a8f0b30ae802676bc1e62e4126f7f3bd67e1b8b218fad0ca3b178a2
SHA512210c80ee611c70fb11d4c4ab789188fd9d7e1ef680fc45410e80b947a730ea165406b82c803b6ae9019b0038713b8be279fc265d9e48dc58a14775e51adf2eb2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fff86db450abcea340ef76e896f44466
SHA1211a6a7d09fd037518e50e0fec36c36e9774ab7b
SHA25639a1ac24c969a4ab446590e7fafd4cd891e06396a5492d6894e7db1fb1f78c82
SHA5120719518eb74628e7de6e87cc96bcf3c09d65259ae54581b677dfd91db6ec7044773b99ecae0f529c5de7a37e46bc643835c12df2e7388262981f8454418b0db0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55181a85a1c3f71dc116bbdded0d35a65
SHA1d589d3a628a07a65f2ffd29124982fa9a1285b7f
SHA2564622e2f65f48b0d408d5c7940caae9b537190ab36d5958d834b9501d9f9b0762
SHA5127c888502142947995fba3035d36c52d98ecaef7c804eb146d918c50c66a43623370cd882fe77a6a749c75acb87478d32f36cf0eba026fdd6a9fbecec01db28e4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54cab8fe01e8d569e8ec9be3c51252da4
SHA159e27e60aa350dd13dca7b5c6537c312afa9c097
SHA256845bfa8c19a9489b6b355d71419c309cd7fc67cc23f9d85c51ffe1ac36dde4c6
SHA5124f81c63c96b9945b496d734e42e6846584fd3d261560a8fed6c1d38c2ccb37112854c71dca1b78a7b8006b658fdfe33dfb351771deede475b00c9e2b59b6fb8d
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec