Analysis
-
max time kernel
85s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
Resource
win10v2004-20240508-en
General
-
Target
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
-
Size
44.1MB
-
MD5
e4897ef7419e128b1f7473119ce0bd07
-
SHA1
5aad252412a5923438f30cb9c397731a9b020121
-
SHA256
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581
-
SHA512
db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c
-
SSDEEP
786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 10872 created 1020 10872 WerFault.exe dwm.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
Processes:
setup.exeupdater.exesvchost.exedescription pid process target process PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 5764 created 3556 5764 setup.exe Explorer.EXE PID 7864 created 3556 7864 updater.exe Explorer.EXE PID 7864 created 3556 7864 updater.exe Explorer.EXE PID 7864 created 3556 7864 updater.exe Explorer.EXE PID 7864 created 3556 7864 updater.exe Explorer.EXE PID 7864 created 3556 7864 updater.exe Explorer.EXE PID 12544 created 1020 12544 svchost.exe dwm.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3232 powershell.exe 7020 powershell.exe 6184 powershell.exe 2420 powershell.exe 5356 powershell.exe -
Contacts a large (1167) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exeBuild.exes.exemain.exeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation s.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation main.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 64 IoCs
Processes:
cstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exemain.exemain.execstealer.execstealer.exeBuild.execstealer.execstealer.execstealer.execstealer.execstealer.exehacn.execstealer.exebased.exehacn.exebased.execstealer.exes.execstealer.execstealer.execstealer.exemain.exesvchost.exesetup.execstealer.exesvchost.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exerar.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exeUpdate.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exepid process 3548 cstealer.exe 2256 cstealer.exe 4600 cstealer.exe 2404 cstealer.exe 4156 cstealer.exe 372 cstealer.exe 4720 cstealer.exe 1304 cstealer.exe 1240 cstealer.exe 5032 cstealer.exe 4852 main.exe 3712 main.exe 740 cstealer.exe 3640 cstealer.exe 4552 Build.exe 3424 cstealer.exe 1620 cstealer.exe 1716 cstealer.exe 3284 cstealer.exe 3964 cstealer.exe 4232 hacn.exe 1456 cstealer.exe 2676 based.exe 3076 hacn.exe 5012 based.exe 4184 cstealer.exe 2688 s.exe 5024 cstealer.exe 3344 cstealer.exe 2324 cstealer.exe 2948 main.exe 5256 svchost.exe 5764 setup.exe 5904 cstealer.exe 5952 svchost.exe 1348 cstealer.exe 7264 cstealer.exe 7420 cstealer.exe 7712 cstealer.exe 7888 cstealer.exe 6828 cstealer.exe 8228 cstealer.exe 8300 cstealer.exe 8408 cstealer.exe 6716 cstealer.exe 8868 cstealer.exe 9200 cstealer.exe 6040 cstealer.exe 6184 rar.exe 6360 cstealer.exe 6456 cstealer.exe 7064 cstealer.exe 6760 cstealer.exe 6640 cstealer.exe 5660 cstealer.exe 5220 cstealer.exe 7468 Update.exe 7672 cstealer.exe 7944 cstealer.exe 8136 cstealer.exe 5844 cstealer.exe 5620 cstealer.exe 5760 cstealer.exe 2396 cstealer.exe -
Loads dropped DLL 64 IoCs
Processes:
cstealer.execstealer.execstealer.execstealer.exepid process 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3712-197-0x00007FF8E3B90000-0x00007FF8E4178000-memory.dmp upx behavioral2/memory/3712-221-0x00007FF8E3B90000-0x00007FF8E4178000-memory.dmp upx behavioral2/memory/5012-335-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-336-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-337-0x00007FF8EADD0000-0x00007FF8EADDF000-memory.dmp upx behavioral2/memory/5012-363-0x00007FF8E7020000-0x00007FF8E704D000-memory.dmp upx behavioral2/memory/5012-366-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-368-0x00007FF8E73C0000-0x00007FF8E73CD000-memory.dmp upx behavioral2/memory/5012-367-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-370-0x00007FF8E6A30000-0x00007FF8E6AE8000-memory.dmp upx behavioral2/memory/5012-369-0x00007FF8E6E70000-0x00007FF8E6E9E000-memory.dmp upx behavioral2/memory/5012-372-0x00007FF8E3C90000-0x00007FF8E4005000-memory.dmp upx behavioral2/memory/5012-365-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-364-0x00007FF8E7000000-0x00007FF8E7019000-memory.dmp upx behavioral2/memory/5012-379-0x00007FF8E50E0000-0x00007FF8E51FC000-memory.dmp upx behavioral2/memory/5012-380-0x00007FF8E6FF0000-0x00007FF8E6FFD000-memory.dmp upx behavioral2/memory/5012-378-0x00007FF8E6E50000-0x00007FF8E6E64000-memory.dmp upx behavioral2/memory/5012-377-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-1975-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-2625-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-2623-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-2833-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-3870-0x00007FF8E50E0000-0x00007FF8E51FC000-memory.dmp upx behavioral2/memory/5012-3876-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-3869-0x00007FF8E6E50000-0x00007FF8E6E64000-memory.dmp upx behavioral2/memory/5012-3868-0x00007FF8E6A30000-0x00007FF8E6AE8000-memory.dmp upx behavioral2/memory/5012-3867-0x00007FF8E6FF0000-0x00007FF8E6FFD000-memory.dmp upx behavioral2/memory/5012-3866-0x00007FF8E6E70000-0x00007FF8E6E9E000-memory.dmp upx behavioral2/memory/5012-3865-0x00007FF8E73C0000-0x00007FF8E73CD000-memory.dmp upx behavioral2/memory/5012-3864-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-3863-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-3859-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-3858-0x00007FF8E7000000-0x00007FF8E7019000-memory.dmp upx behavioral2/memory/5012-3857-0x00007FF8E7020000-0x00007FF8E704D000-memory.dmp upx behavioral2/memory/5012-3856-0x00007FF8EADD0000-0x00007FF8EADDF000-memory.dmp upx behavioral2/memory/5012-3854-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-3853-0x00007FF8E3C90000-0x00007FF8E4005000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\кокершмидт = "C:\\ProgramData\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 21 raw.githubusercontent.com 24 raw.githubusercontent.com 90 raw.githubusercontent.com 93 discord.com 95 discord.com 20 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com 29 api.ipify.org 30 api.ipify.org -
Drops file in System32 directory 4 IoCs
Processes:
svchost.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
svchost.exepid process 5952 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
setup.exeupdater.exedescription pid process target process PID 5764 set thread context of 7816 5764 setup.exe dialer.exe PID 7864 set thread context of 11108 7864 updater.exe dialer.exe PID 7864 set thread context of 12028 7864 updater.exe dialer.exe PID 7864 set thread context of 12600 7864 updater.exe dialer.exe -
Drops file in Program Files directory 1 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe setup.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 5688 sc.exe 7428 sc.exe 10332 sc.exe 7480 sc.exe 1876 sc.exe 5000 sc.exe 10412 sc.exe 10512 sc.exe 10732 sc.exe 10792 sc.exe -
Detects Pyinstaller 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\cstealer.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\main.exe pyinstaller C:\ProgramData\Microsoft\hacn.exe pyinstaller C:\ProgramData\svchost.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dwm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 7724 schtasks.exe 11480 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 6436 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 4456 tasklist.exe 3496 tasklist.exe 6048 tasklist.exe 5184 tasklist.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dwm.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exedwm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Modifies registry class 4 IoCs
Processes:
RuntimeBroker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\MostRecentlyUsed RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\CurrentWorkingDirectory RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\ManagedByApp RuntimeBroker.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exemain.exepowershell.exepowershell.exepowershell.exepowershell.exeUpdate.exepid process 2420 powershell.exe 2420 powershell.exe 5244 powershell.exe 5244 powershell.exe 5356 powershell.exe 5356 powershell.exe 5820 powershell.exe 5820 powershell.exe 2420 powershell.exe 2420 powershell.exe 3232 powershell.exe 3232 powershell.exe 5244 powershell.exe 5244 powershell.exe 5820 powershell.exe 3232 powershell.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 5356 powershell.exe 8780 powershell.exe 8780 powershell.exe 8780 powershell.exe 9028 powershell.exe 9028 powershell.exe 9028 powershell.exe 7184 powershell.exe 7184 powershell.exe 7184 powershell.exe 7772 powershell.exe 7772 powershell.exe 7772 powershell.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3556 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tasklist.exetasklist.exemain.exepowershell.exepowershell.exepowershell.exeWMIC.exetasklist.exepowershell.exepowershell.exepowershell.exepowershell.exetasklist.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4456 tasklist.exe Token: SeDebugPrivilege 3496 tasklist.exe Token: SeDebugPrivilege 2948 main.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 5244 powershell.exe Token: SeDebugPrivilege 5356 powershell.exe Token: SeIncreaseQuotaPrivilege 6016 WMIC.exe Token: SeSecurityPrivilege 6016 WMIC.exe Token: SeTakeOwnershipPrivilege 6016 WMIC.exe Token: SeLoadDriverPrivilege 6016 WMIC.exe Token: SeSystemProfilePrivilege 6016 WMIC.exe Token: SeSystemtimePrivilege 6016 WMIC.exe Token: SeProfSingleProcessPrivilege 6016 WMIC.exe Token: SeIncBasePriorityPrivilege 6016 WMIC.exe Token: SeCreatePagefilePrivilege 6016 WMIC.exe Token: SeBackupPrivilege 6016 WMIC.exe Token: SeRestorePrivilege 6016 WMIC.exe Token: SeShutdownPrivilege 6016 WMIC.exe Token: SeDebugPrivilege 6016 WMIC.exe Token: SeSystemEnvironmentPrivilege 6016 WMIC.exe Token: SeRemoteShutdownPrivilege 6016 WMIC.exe Token: SeUndockPrivilege 6016 WMIC.exe Token: SeManageVolumePrivilege 6016 WMIC.exe Token: 33 6016 WMIC.exe Token: 34 6016 WMIC.exe Token: 35 6016 WMIC.exe Token: 36 6016 WMIC.exe Token: SeDebugPrivilege 6048 tasklist.exe Token: SeDebugPrivilege 5820 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe Token: SeIncreaseQuotaPrivilege 6016 WMIC.exe Token: SeSecurityPrivilege 6016 WMIC.exe Token: SeTakeOwnershipPrivilege 6016 WMIC.exe Token: SeLoadDriverPrivilege 6016 WMIC.exe Token: SeSystemProfilePrivilege 6016 WMIC.exe Token: SeSystemtimePrivilege 6016 WMIC.exe Token: SeProfSingleProcessPrivilege 6016 WMIC.exe Token: SeIncBasePriorityPrivilege 6016 WMIC.exe Token: SeCreatePagefilePrivilege 6016 WMIC.exe Token: SeBackupPrivilege 6016 WMIC.exe Token: SeRestorePrivilege 6016 WMIC.exe Token: SeShutdownPrivilege 6016 WMIC.exe Token: SeDebugPrivilege 6016 WMIC.exe Token: SeSystemEnvironmentPrivilege 6016 WMIC.exe Token: SeRemoteShutdownPrivilege 6016 WMIC.exe Token: SeUndockPrivilege 6016 WMIC.exe Token: SeManageVolumePrivilege 6016 WMIC.exe Token: 33 6016 WMIC.exe Token: 34 6016 WMIC.exe Token: 35 6016 WMIC.exe Token: 36 6016 WMIC.exe Token: SeDebugPrivilege 8780 powershell.exe Token: SeDebugPrivilege 9028 powershell.exe Token: SeDebugPrivilege 5184 tasklist.exe Token: SeIncreaseQuotaPrivilege 6520 WMIC.exe Token: SeSecurityPrivilege 6520 WMIC.exe Token: SeTakeOwnershipPrivilege 6520 WMIC.exe Token: SeLoadDriverPrivilege 6520 WMIC.exe Token: SeSystemProfilePrivilege 6520 WMIC.exe Token: SeSystemtimePrivilege 6520 WMIC.exe Token: SeProfSingleProcessPrivilege 6520 WMIC.exe Token: SeIncBasePriorityPrivilege 6520 WMIC.exe Token: SeCreatePagefilePrivilege 6520 WMIC.exe Token: SeBackupPrivilege 6520 WMIC.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
Explorer.EXEpid process 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
Update.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exeConhost.exepid process 7468 Update.exe 9468 Conhost.exe 8848 Conhost.exe 8368 Conhost.exe 7960 Conhost.exe 6188 Conhost.exe 9444 Conhost.exe 5680 Conhost.exe 10096 Conhost.exe 9356 Conhost.exe 9092 Conhost.exe 6180 Conhost.exe 2568 Conhost.exe 9428 Conhost.exe 8196 Conhost.exe 10532 Conhost.exe 10932 Conhost.exe 10472 Conhost.exe 11516 Conhost.exe 11768 Conhost.exe 11536 Conhost.exe 11668 Conhost.exe 11292 Conhost.exe 12116 Conhost.exe 11756 Conhost.exe 12968 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.execstealer.execstealer.execmd.execstealer.execstealer.execmd.execstealer.execstealer.execmd.execstealer.execstealer.execmd.execstealer.exemain.execstealer.exemain.execmd.execstealer.execstealer.execmd.execmd.execstealer.execstealer.execmd.execstealer.exeBuild.execstealer.execmd.execstealer.exedescription pid process target process PID 1804 wrote to memory of 3548 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe cstealer.exe PID 1804 wrote to memory of 3548 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe cstealer.exe PID 3548 wrote to memory of 2256 3548 cstealer.exe cstealer.exe PID 3548 wrote to memory of 2256 3548 cstealer.exe cstealer.exe PID 2256 wrote to memory of 2280 2256 cstealer.exe cmd.exe PID 2256 wrote to memory of 2280 2256 cstealer.exe cmd.exe PID 2280 wrote to memory of 4600 2280 cmd.exe cstealer.exe PID 2280 wrote to memory of 4600 2280 cmd.exe cstealer.exe PID 4600 wrote to memory of 2404 4600 cstealer.exe cstealer.exe PID 4600 wrote to memory of 2404 4600 cstealer.exe cstealer.exe PID 2404 wrote to memory of 3568 2404 cstealer.exe cmd.exe PID 2404 wrote to memory of 3568 2404 cstealer.exe cmd.exe PID 3568 wrote to memory of 4156 3568 cmd.exe cstealer.exe PID 3568 wrote to memory of 4156 3568 cmd.exe cstealer.exe PID 4156 wrote to memory of 372 4156 cstealer.exe cstealer.exe PID 4156 wrote to memory of 372 4156 cstealer.exe cstealer.exe PID 372 wrote to memory of 1248 372 cstealer.exe cmd.exe PID 372 wrote to memory of 1248 372 cstealer.exe cmd.exe PID 1248 wrote to memory of 4720 1248 cmd.exe cstealer.exe PID 1248 wrote to memory of 4720 1248 cmd.exe cstealer.exe PID 4720 wrote to memory of 1304 4720 cstealer.exe cstealer.exe PID 4720 wrote to memory of 1304 4720 cstealer.exe cstealer.exe PID 1304 wrote to memory of 1520 1304 cstealer.exe cmd.exe PID 1304 wrote to memory of 1520 1304 cstealer.exe cmd.exe PID 1520 wrote to memory of 1240 1520 cmd.exe cstealer.exe PID 1520 wrote to memory of 1240 1520 cmd.exe cstealer.exe PID 1240 wrote to memory of 5032 1240 cstealer.exe cstealer.exe PID 1240 wrote to memory of 5032 1240 cstealer.exe cstealer.exe PID 1804 wrote to memory of 4852 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe main.exe PID 1804 wrote to memory of 4852 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe main.exe PID 4852 wrote to memory of 3712 4852 main.exe main.exe PID 4852 wrote to memory of 3712 4852 main.exe main.exe PID 5032 wrote to memory of 4152 5032 cstealer.exe cmd.exe PID 5032 wrote to memory of 4152 5032 cstealer.exe cmd.exe PID 3712 wrote to memory of 4444 3712 main.exe cmd.exe PID 3712 wrote to memory of 4444 3712 main.exe cmd.exe PID 4152 wrote to memory of 740 4152 cmd.exe cstealer.exe PID 4152 wrote to memory of 740 4152 cmd.exe cstealer.exe PID 740 wrote to memory of 3640 740 cstealer.exe cstealer.exe PID 740 wrote to memory of 3640 740 cstealer.exe cstealer.exe PID 3640 wrote to memory of 2760 3640 cstealer.exe cmd.exe PID 3640 wrote to memory of 2760 3640 cstealer.exe cmd.exe PID 4444 wrote to memory of 4552 4444 cmd.exe Build.exe PID 4444 wrote to memory of 4552 4444 cmd.exe Build.exe PID 4444 wrote to memory of 4552 4444 cmd.exe Build.exe PID 2760 wrote to memory of 3424 2760 cmd.exe cstealer.exe PID 2760 wrote to memory of 3424 2760 cmd.exe cstealer.exe PID 3424 wrote to memory of 1620 3424 cstealer.exe cstealer.exe PID 3424 wrote to memory of 1620 3424 cstealer.exe cstealer.exe PID 1620 wrote to memory of 4780 1620 cstealer.exe cmd.exe PID 1620 wrote to memory of 4780 1620 cstealer.exe cmd.exe PID 4780 wrote to memory of 1716 4780 cmd.exe cstealer.exe PID 4780 wrote to memory of 1716 4780 cmd.exe cstealer.exe PID 1716 wrote to memory of 3284 1716 cstealer.exe cstealer.exe PID 1716 wrote to memory of 3284 1716 cstealer.exe cstealer.exe PID 4552 wrote to memory of 4232 4552 Build.exe hacn.exe PID 4552 wrote to memory of 4232 4552 Build.exe hacn.exe PID 3284 wrote to memory of 2876 3284 cstealer.exe cmd.exe PID 3284 wrote to memory of 2876 3284 cstealer.exe cmd.exe PID 2876 wrote to memory of 3964 2876 cmd.exe cstealer.exe PID 2876 wrote to memory of 3964 2876 cmd.exe cstealer.exe PID 4552 wrote to memory of 2676 4552 Build.exe based.exe PID 4552 wrote to memory of 2676 4552 Build.exe based.exe PID 3964 wrote to memory of 1456 3964 cstealer.exe cstealer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1020
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1020 -s 30803⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:11960
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:10728
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1096
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2900
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:7864 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\yntnomxcupkb.xml"3⤵
- Creates scheduled task(s)
PID:11480
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1400
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2580
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1892
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2828
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2952
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3452
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe"C:\Users\Admin\AppData\Local\Temp\6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"5⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"8⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"14⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"17⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"20⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"23⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"26⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet28⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"29⤵PID:4884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV130⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet30⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet31⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"32⤵PID:4204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet33⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet34⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"35⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet36⤵
- Executes dropped EXE
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet37⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"38⤵PID:5136
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet39⤵
- Executes dropped EXE
PID:7264 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet40⤵
- Executes dropped EXE
PID:7420 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"41⤵PID:7608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet42⤵
- Executes dropped EXE
PID:7712 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet43⤵
- Executes dropped EXE
PID:7888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"44⤵PID:5860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet45⤵
- Executes dropped EXE
PID:6828 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet46⤵
- Executes dropped EXE
PID:8228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"47⤵PID:8244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV148⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet48⤵
- Executes dropped EXE
PID:8300 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet49⤵
- Executes dropped EXE
PID:8408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"50⤵PID:8588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:8580
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet51⤵
- Executes dropped EXE
PID:6716 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet52⤵
- Executes dropped EXE
PID:8868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"53⤵PID:9132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:9140
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet54⤵
- Executes dropped EXE
PID:9200 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet55⤵
- Executes dropped EXE
PID:6040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"56⤵PID:6304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet57⤵
- Executes dropped EXE
PID:6360 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet58⤵
- Executes dropped EXE
PID:6456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"59⤵PID:6604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet60⤵
- Executes dropped EXE
PID:7064 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet61⤵
- Executes dropped EXE
PID:6760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"62⤵PID:7160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet63⤵
- Executes dropped EXE
PID:6640 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet64⤵
- Executes dropped EXE
PID:5660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"65⤵PID:7232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet66⤵
- Executes dropped EXE
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet67⤵
- Executes dropped EXE
PID:7672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"68⤵PID:7852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:7696
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet69⤵
- Executes dropped EXE
PID:7944 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet70⤵
- Executes dropped EXE
PID:8136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"71⤵PID:5236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV172⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet72⤵
- Executes dropped EXE
PID:5844 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet73⤵
- Executes dropped EXE
PID:5620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"74⤵PID:5416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet75⤵
- Executes dropped EXE
PID:5760 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet76⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"77⤵PID:380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet78⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet79⤵PID:8212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"80⤵PID:5200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:8316
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet81⤵PID:8336
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet82⤵PID:3496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"83⤵PID:3316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV184⤵PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet84⤵PID:8480
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet85⤵PID:3068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"86⤵PID:2060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet87⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet88⤵PID:8744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"89⤵PID:8932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV190⤵PID:8596
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet90⤵PID:8960
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet91⤵PID:6084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"92⤵PID:3712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet93⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet94⤵PID:3352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"95⤵PID:6172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV196⤵PID:6148
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet96⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet97⤵PID:6444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"98⤵PID:5692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet99⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet100⤵PID:7008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"101⤵PID:6788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:7004
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet102⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet103⤵PID:7028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"104⤵PID:6740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet105⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet106⤵PID:7080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"107⤵PID:5228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet108⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet109⤵PID:2988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"110⤵PID:7996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet111⤵PID:7780
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet112⤵PID:4896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"113⤵PID:972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet114⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet115⤵PID:5252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"116⤵PID:4908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵
- Suspicious use of SetWindowsHookEx
PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet117⤵PID:9164
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet118⤵PID:6508
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"119⤵PID:6208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1120⤵PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet120⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet121⤵PID:8948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"122⤵PID:8040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-