Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
Resource
win10v2004-20240802-en
General
-
Target
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe
-
Size
2.8MB
-
MD5
e6c2e04d19d1e3bb6c9328c4818166dd
-
SHA1
fe820813cf5ffc8b32f727fbd026856e2af665c9
-
SHA256
96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872
-
SHA512
c0f594ff2a1120f87518802b39e482e8611dfe371ba0be7fbcd41c5423ec73117e527c6920744f9ce0c673a4f0a44c7324fc8054774613917595557ee9582a04
-
SSDEEP
12288:vj7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7:/cX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Deletes itself 1 IoCs
pid Process 2100 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 61 IoCs
pid Process 2116 Logo1_.exe 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2884 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2668 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2500 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1248 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1388 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2836 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3060 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1148 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1932 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2448 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2340 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2404 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2716 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2872 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2744 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2780 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1988 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1876 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1080 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1968 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1388 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2084 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1608 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2996 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2188 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 348 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1112 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2940 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2192 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2916 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2340 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2404 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2864 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2720 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2840 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2896 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 764 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 840 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1232 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3008 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1608 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2880 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1348 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 276 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1268 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2568 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 560 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2168 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1412 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 888 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2068 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2360 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1400 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2648 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 3004 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2792 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2700 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 1400 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Loads dropped DLL 64 IoCs
pid Process 2100 cmd.exe 2100 cmd.exe 2744 cmd.exe 2744 cmd.exe 2304 cmd.exe 2304 cmd.exe 2900 cmd.exe 2900 cmd.exe 552 cmd.exe 552 cmd.exe 2376 cmd.exe 2376 cmd.exe 2944 cmd.exe 2944 cmd.exe 2544 cmd.exe 2544 cmd.exe 2984 cmd.exe 2984 cmd.exe 2016 cmd.exe 2016 cmd.exe 792 cmd.exe 792 cmd.exe 3032 cmd.exe 3032 cmd.exe 2336 cmd.exe 2336 cmd.exe 2704 cmd.exe 2704 cmd.exe 2768 cmd.exe 2768 cmd.exe 2636 cmd.exe 2636 cmd.exe 2612 cmd.exe 2612 cmd.exe 1552 cmd.exe 1552 cmd.exe 840 cmd.exe 840 cmd.exe 1956 cmd.exe 1956 cmd.exe 552 cmd.exe 552 cmd.exe 1840 cmd.exe 1840 cmd.exe 2600 cmd.exe 2600 cmd.exe 2852 cmd.exe 2852 cmd.exe 2232 cmd.exe 2232 cmd.exe 1528 cmd.exe 1528 cmd.exe 2592 cmd.exe 2592 cmd.exe 2020 cmd.exe 2020 cmd.exe 956 cmd.exe 956 cmd.exe 1844 cmd.exe 1844 cmd.exe 2040 cmd.exe 2040 cmd.exe 2408 cmd.exe 2408 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TempCom = "C:\\WINDOWS\\FONTS\\C8C64.com" 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\WINDOWS\FONTS\C8C64.com 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File opened for modification C:\WINDOWS\FONTS\C8C64.com 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\rundl132.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe File created C:\Windows\Logo1_.exe 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1400 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2100 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 30 PID 2528 wrote to memory of 2100 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 30 PID 2528 wrote to memory of 2100 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 30 PID 2528 wrote to memory of 2100 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 30 PID 2528 wrote to memory of 2116 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 31 PID 2528 wrote to memory of 2116 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 31 PID 2528 wrote to memory of 2116 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 31 PID 2528 wrote to memory of 2116 2528 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 31 PID 2116 wrote to memory of 2704 2116 Logo1_.exe 33 PID 2116 wrote to memory of 2704 2116 Logo1_.exe 33 PID 2116 wrote to memory of 2704 2116 Logo1_.exe 33 PID 2116 wrote to memory of 2704 2116 Logo1_.exe 33 PID 2704 wrote to memory of 2816 2704 net.exe 35 PID 2704 wrote to memory of 2816 2704 net.exe 35 PID 2704 wrote to memory of 2816 2704 net.exe 35 PID 2704 wrote to memory of 2816 2704 net.exe 35 PID 2100 wrote to memory of 2828 2100 cmd.exe 36 PID 2100 wrote to memory of 2828 2100 cmd.exe 36 PID 2100 wrote to memory of 2828 2100 cmd.exe 36 PID 2100 wrote to memory of 2828 2100 cmd.exe 36 PID 2828 wrote to memory of 2744 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 37 PID 2828 wrote to memory of 2744 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 37 PID 2828 wrote to memory of 2744 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 37 PID 2828 wrote to memory of 2744 2828 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 37 PID 2744 wrote to memory of 2884 2744 cmd.exe 39 PID 2744 wrote to memory of 2884 2744 cmd.exe 39 PID 2744 wrote to memory of 2884 2744 cmd.exe 39 PID 2744 wrote to memory of 2884 2744 cmd.exe 39 PID 2884 wrote to memory of 2304 2884 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 40 PID 2884 wrote to memory of 2304 2884 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 40 PID 2884 wrote to memory of 2304 2884 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 40 PID 2884 wrote to memory of 2304 2884 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 40 PID 2304 wrote to memory of 2668 2304 cmd.exe 42 PID 2304 wrote to memory of 2668 2304 cmd.exe 42 PID 2304 wrote to memory of 2668 2304 cmd.exe 42 PID 2304 wrote to memory of 2668 2304 cmd.exe 42 PID 2668 wrote to memory of 2900 2668 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 43 PID 2668 wrote to memory of 2900 2668 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 43 PID 2668 wrote to memory of 2900 2668 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 43 PID 2668 wrote to memory of 2900 2668 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 43 PID 2900 wrote to memory of 2500 2900 cmd.exe 45 PID 2900 wrote to memory of 2500 2900 cmd.exe 45 PID 2900 wrote to memory of 2500 2900 cmd.exe 45 PID 2900 wrote to memory of 2500 2900 cmd.exe 45 PID 2500 wrote to memory of 552 2500 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 46 PID 2500 wrote to memory of 552 2500 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 46 PID 2500 wrote to memory of 552 2500 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 46 PID 2500 wrote to memory of 552 2500 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 46 PID 2116 wrote to memory of 1180 2116 Logo1_.exe 21 PID 2116 wrote to memory of 1180 2116 Logo1_.exe 21 PID 552 wrote to memory of 1248 552 cmd.exe 48 PID 552 wrote to memory of 1248 552 cmd.exe 48 PID 552 wrote to memory of 1248 552 cmd.exe 48 PID 552 wrote to memory of 1248 552 cmd.exe 48 PID 1248 wrote to memory of 2376 1248 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 49 PID 1248 wrote to memory of 2376 1248 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 49 PID 1248 wrote to memory of 2376 1248 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 49 PID 1248 wrote to memory of 2376 1248 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 49 PID 2376 wrote to memory of 1388 2376 cmd.exe 51 PID 2376 wrote to memory of 1388 2376 cmd.exe 51 PID 2376 wrote to memory of 1388 2376 cmd.exe 51 PID 2376 wrote to memory of 1388 2376 cmd.exe 51 PID 1388 wrote to memory of 2944 1388 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 52 PID 1388 wrote to memory of 2944 1388 96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe 52
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC81F.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC9B5.bat5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCB2B.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCC92.bat9⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCCE0.bat11⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCF60.bat13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD0F5.bat15⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"16⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD23D.bat17⤵
- Loads dropped DLL
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD394.bat19⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"20⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1148 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD4DC.bat21⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"22⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD5F5.bat23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:792 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"24⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD73C.bat25⤵
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"26⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD8B3.bat27⤵
- Loads dropped DLL
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"28⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD8F1.bat29⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"30⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD94F.bat31⤵
- Loads dropped DLL
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"32⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD98D.bat33⤵
- Loads dropped DLL
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"34⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD9DB.bat35⤵
- Loads dropped DLL
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDA19.bat37⤵
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDA67.bat39⤵
- Loads dropped DLL
PID:840 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"40⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDAB5.bat41⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1080 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDAF4.bat43⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:552 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDB32.bat45⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1388 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDB71.bat47⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"48⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDBAF.bat49⤵
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"50⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDBED.bat51⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDC1C.bat53⤵
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDC5B.bat55⤵
- Loads dropped DLL
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDC99.bat57⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"58⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDCE7.bat59⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"60⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDD35.bat61⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"62⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDD73.bat63⤵
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDDC2.bat65⤵
- Loads dropped DLL
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"66⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDE1F.bat67⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"68⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDE6D.bat69⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"70⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDEBB.bat71⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"72⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDEFA.bat73⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"74⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDF48.bat75⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"76⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDF96.bat77⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"78⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aDFF3.bat79⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"80⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE051.bat81⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"82⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1232 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE0AE.bat83⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"84⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE11C.bat85⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"86⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE1C7.bat87⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"88⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE2A2.bat89⤵
- System Location Discovery: System Language Discovery
PID:664 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"90⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE35D.bat91⤵
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"92⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE3CA.bat93⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"94⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE428.bat95⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"96⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE476.bat97⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"98⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:560 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE4F2.bat99⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"100⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE540.bat101⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"102⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1412 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE57F.bat103⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"104⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE5CD.bat105⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"106⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE61B.bat107⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"108⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE659.bat109⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"110⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1400 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE6A7.bat111⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"112⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE6F5.bat113⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"114⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE743.bat115⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"116⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE791.bat117⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"118⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE7DF.bat119⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"120⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2700 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE87B.bat121⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"C:\Users\Admin\AppData\Local\Temp\96c1eccc30764a57301b3577ca8befda333174cd14eda6562344987585983872.exe"122⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-