Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 05:23
Behavioral task
behavioral1
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win10v2004-20241007-en
General
-
Target
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
-
Size
348KB
-
MD5
b9befe5cf8c341b816fcd1922accf117
-
SHA1
08ca40d0fc0c580caeb6c15aa5289bef223dd6d4
-
SHA256
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d
-
SHA512
3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08
Malware Config
Signatures
-
Gh0st RAT payload 51 IoCs
Processes:
resource yara_rule behavioral2/memory/3704-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Users\Admin\AppData\Local\Temp\ymi79F4.tmp family_gh0strat C:\Windows\SysWOW64\inlsmacbt.exe family_gh0strat behavioral2/memory/4596-24-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4596-46-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\insvxwpco.exe family_gh0strat behavioral2/memory/1796-68-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inpsutmlb.exe family_gh0strat behavioral2/memory/3704-76-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\innuocedv.exe family_gh0strat behavioral2/memory/4564-106-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\invrckwrg.exe family_gh0strat C:\Windows\SysWOW64\inxtemyti.exe family_gh0strat C:\Windows\SysWOW64\inwhpwale.exe family_gh0strat C:\Windows\SysWOW64\inkzrlbas.exe family_gh0strat behavioral2/memory/1792-665-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1388-646-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4188-616-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/216-607-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4076-589-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2792-559-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/736-550-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4556-532-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2276-513-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4100-494-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2900-475-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3112-445-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4564-436-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2820-418-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2484-388-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3432-380-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inqtvunam.exe family_gh0strat behavioral2/memory/1328-346-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inrngsnzc.exe family_gh0strat behavioral2/memory/4324-336-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inldtepix.exe family_gh0strat behavioral2/memory/4060-300-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inyjbrycn.exe family_gh0strat behavioral2/memory/1120-290-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inzvgovkd.exe family_gh0strat behavioral2/memory/3616-267-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inetlfmxc.exe family_gh0strat behavioral2/memory/408-231-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\incrjzdkv.exe family_gh0strat behavioral2/memory/4392-220-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\insohtodl.exe family_gh0strat behavioral2/memory/1356-197-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1276-174-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1752-152-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3636-117-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Users\Admin\AppData\Local\Temp\gci1D43.tmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
inmprqjiy.exeinbpxnjbw.exeinwpkmkez.exeinfhrodsv.exeinaaajueu.exeinrtwgusw.exeinuizasnp.exeinmwmixdn.exeinzhuwqpq.exeindwztgsi.exeinknedlyl.exeinmhgesgy.exeinngmlnpt.exeinhpkypiu.exeincbrdfjw.exeinrmygnhd.exeinkmhgrmq.exeinrzweovz.exeinanbwzzr.exeinqklaasr.exeinijzqpfx.exeinomzqrdt.exeinupalliz.exeinmqlrpew.exeinhxjlpig.exeinixpjqgj.exeinfagddmf.exeindbxwxmz.exeinljhllwj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E03F8A2-E18B-406c-A196-2C65906F45F3}\stubpath = "C:\\Windows\\system32\\inlofemzm.exe" inmprqjiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{120F16F6-C82F-4538-9D8F-7A78EF1DBDE7}\stubpath = "C:\\Windows\\system32\\intojzuff.exe" inbpxnjbw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C583851-E3D9-4ddd-8AEF-8B3BEC8C6B46} inwpkmkez.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AAF34523-B941-4f7d-8B95-9C0298C6FF9D} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{378AA00D-B34E-4e2a-9D73-AED94AFA4513}\stubpath = "C:\\Windows\\system32\\inptshptt.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{51F1C209-63C1-4efd-AAC0-0256E1F066EE} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A68CBF7-BFE0-4133-9D8E-F47F2E54287B}\stubpath = "C:\\Windows\\system32\\invdpowvp.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F57529A0-0772-422f-AA44-CA1460CC28D8} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E3136FF-385D-461a-8F27-EF2B881196C3}\stubpath = "C:\\Windows\\system32\\inycopaqa.exe" infhrodsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A758A96-5A6E-49a9-8F62-C2AF86BE7049} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{652EFC8B-CBD2-402f-B3C4-0BBE0FC1323C}\stubpath = "C:\\Windows\\system32\\inbdauejc.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8795D125-5203-4e27-B4BC-C62D63D60E4E}\stubpath = "C:\\Windows\\system32\\incraptug.exe" inaaajueu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9846FA7B-D467-4e29-984D-CEAF000DE10C} inrtwgusw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2607594D-B3A6-4e02-9B60-16C74F046A5B} inuizasnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4AD1F6FF-6931-486a-BA93-9C7F9465A6E6} inmwmixdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{313DD456-7618-4108-8174-0D050ECAA50C} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7658A68D-975F-4f27-A1B9-06B775F184D8}\stubpath = "C:\\Windows\\system32\\inwojflbg.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{041B881F-C0E0-4de5-8C88-BCA5BC2223E1}\stubpath = "C:\\Windows\\system32\\inbsfowhf.exe" inzhuwqpq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95385958-E09A-45c0-AD10-050ABD01D987} indwztgsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66CB4648-3B66-4f06-A353-008B4781AE57} inknedlyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{15094D40-A79E-4509-85B3-BDC6EBCB0F6E} inmhgesgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C096EA4B-037E-4831-9022-E2CF40A29A02} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBB64D75-5AC6-4dbc-BA5B-7F8891B559C8}\stubpath = "C:\\Windows\\system32\\inunfxaxv.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{96EF16A8-2150-4e2a-BBE5-029FCF92B829} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE43D11D-3F51-4877-A834-9AE19F1781CB} inngmlnpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7AA6713D-5CA1-40f5-A071-675AC52B8E74} inhpkypiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3749517B-9019-4898-9885-3C6EFE002EE1}\stubpath = "C:\\Windows\\system32\\ingstoqsw.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{96135604-163C-4018-A995-D81135B7EF93}\stubpath = "C:\\Windows\\system32\\inxtleici.exe" incbrdfjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC84B615-B319-48e3-A91E-217E8C2C4501} inrmygnhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F978011E-F7CA-4e9f-B5F9-EDE469960832} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73B9BC87-FC26-4e62-9803-3DC550B7BD43} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{168E870E-E71A-473d-B9CF-03BEB7CD392D}\stubpath = "C:\\Windows\\system32\\ingcowdkg.exe" inkmhgrmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EEB87F9-8F2D-484d-A86A-75253ADA69F3}\stubpath = "C:\\Windows\\system32\\inwrucabh.exe" inrzweovz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B0B275D-395C-4204-B906-4A9617DF192A}\stubpath = "C:\\Windows\\system32\\inzzqagrh.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D5B5662-3A17-467c-9098-C5E990652780} inanbwzzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E95EA471-341B-4359-B02B-2C53207F5544} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{815285DC-D3A2-440d-806A-27C418379441} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5E810D54-08E4-458f-92D8-20F0E14BCFA9}\stubpath = "C:\\Windows\\system32\\inygefler.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00BCD5F0-7B04-4b4d-9EC8-8FFFCE60D400}\stubpath = "C:\\Windows\\system32\\inpitupmy.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF2BD5B8-D330-49b9-8578-2F01A5B57400} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0B3BD90-5D6E-462c-9953-0743826B5FC3} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{366106D3-6034-4959-9A5A-9D36014582D7} inqklaasr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6663DDE-B88E-4caa-84C0-E356C833F60F} inijzqpfx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9FC3EB5-9FD3-44a1-81EC-6A1E2066FC87}\stubpath = "C:\\Windows\\system32\\intfcqrci.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B977718D-C1C6-415c-AD98-F8DB84BA99E9}\stubpath = "C:\\Windows\\system32\\infumgnyd.exe" inomzqrdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6D3A93F5-7DB9-4ef0-AD6E-AA828EF68066} inupalliz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17E3B315-58CC-4906-89AE-EFF6F354B62D} inmqlrpew.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D19F5B01-AFE3-4df7-8E95-580EB3858637} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC8CB8CC-FD7E-4dad-9805-F3C0C1040EB8} inhxjlpig.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6397ED4-842A-4e63-BEA9-9A2218464C19} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DC3CE02-8393-450d-84BD-C32213868304}\stubpath = "C:\\Windows\\system32\\injvmflfv.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2FEA662-5BBD-4cdd-A549-2122DF79CE41}\stubpath = "C:\\Windows\\system32\\inopnqqjb.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1961CC25-B8AF-4434-8066-30BF3EC1790F} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{77FAB666-7F64-462f-860E-AD3D501DC2F8}\stubpath = "C:\\Windows\\system32\\injmdckxk.exe" inixpjqgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F978011E-F7CA-4e9f-B5F9-EDE469960832}\stubpath = "C:\\Windows\\system32\\inucqrdpv.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F25495AC-6671-465f-B599-173608328884}\stubpath = "C:\\Windows\\system32\\inoxamzxs.exe" infagddmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8EFFC84E-E79C-484d-9AEE-A325A4DB7E35}\stubpath = "C:\\Windows\\system32\\injhlewdz.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B68E604E-3CC4-462a-856B-FB050F7FC2E0}\stubpath = "C:\\Windows\\system32\\ininmuqqw.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44B446CF-6394-43e6-9112-C915FFDDA998} indbxwxmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7C555B0-1657-4bde-ABD4-77161DA424C7} inljhllwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F09C15F-085A-4c77-8B0F-3890C8035FEC} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD0DB193-5F1F-4431-92C1-E7FE48B56657}\stubpath = "C:\\Windows\\system32\\inbkooyol.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A6A864B-7879-43f4-9E8C-E25F398CB651}\stubpath = "C:\\Windows\\system32\\inowkjrad.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1707DCF-E97C-4d0d-B8FA-C989C9748F8B} -
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmi79C4.tmp acprotect C:\Users\Admin\AppData\Local\Temp\gmi7A41.tmp acprotect C:\Users\Admin\AppData\Local\Temp\lmi7A70.tmp acprotect C:\Users\Admin\AppData\Local\Temp\umi7ACD.tmp acprotect C:\Users\Admin\AppData\Local\Temp\xmi7BE7.tmp acprotect C:\Users\Admin\AppData\Local\Temp\rmi7CB2.tmp acprotect C:\Users\Admin\AppData\Local\Temp\rmi7DAC.tmp acprotect C:\Users\Admin\AppData\Local\Temp\vmi7DDB.tmp acprotect C:\Users\Admin\AppData\Local\Temp\smi7EB5.tmp acprotect C:\Users\Admin\AppData\Local\Temp\nmi7E86.tmp acprotect C:\Users\Admin\AppData\Local\Temp\hmi7E48.tmp acprotect C:\Users\Admin\AppData\Local\Temp\cmi7E19.tmp acprotect C:\Users\Admin\AppData\Local\Temp\kmi7D6D.tmp acprotect C:\Users\Admin\AppData\Local\Temp\bmi7D0F.tmp acprotect C:\Users\Admin\AppData\Local\Temp\kmi7C64.tmp acprotect C:\Users\Admin\AppData\Local\Temp\fmi7C35.tmp acprotect -
Executes dropped EXE 64 IoCs
Processes:
inlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exeinvuwaxma.exeineybxzdp.exeinixpjqgj.exeinjmdckxk.exeinmeufqjy.exeinaphxbit.exeinomzqrdt.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeinwixlnmf.exeinzloqpih.exeinnqsrkjz.exeinoavpdfe.exeinrdysgih.exeintfuikjc.exeineuxonvv.exeinjyqkarh.exeinefvmlzb.exeinwmpgfnn.exeinqcxrfhg.exeindskelwb.exeingvnhoze.exeintcrvwiy.exeinzkcszdo.exeinjhulmow.exeinmibthrw.exeinadbobmd.exeingerepgv.exeinhwoipfi.exeinilcbjwj.exeinutvwllh.exeindxawycz.exeinbqostfv.exeinfnwdvwr.exeingvetxyk.exeinewrcnnk.exeinkivmnpx.exeincwvxbyn.exepid process 4596 inlsmacbt.exe 1796 inpsutmlb.exe 4564 insvxwpco.exe 3636 innuocedv.exe 1752 invrckwrg.exe 1276 inxtemyti.exe 1356 inwhpwale.exe 4392 inkzrlbas.exe 408 insohtodl.exe 3616 incrjzdkv.exe 1120 inetlfmxc.exe 4060 inzvgovkd.exe 4324 inyjbrycn.exe 1328 inldtepix.exe 3432 inrngsnzc.exe 2484 inqtvunam.exe 2820 inwsdlxsh.exe 4564 insbquvhx.exe 3112 inxiaqxbm.exe 2900 ingvzmksi.exe 4100 inqmfrmyb.exe 2276 invuwaxma.exe 4556 ineybxzdp.exe 736 inixpjqgj.exe 2792 injmdckxk.exe 4076 inmeufqjy.exe 216 inaphxbit.exe 4188 inomzqrdt.exe 1388 infumgnyd.exe 1792 inxjymong.exe 2900 inpleqlxa.exe 2428 inortslka.exe 2524 inruwvobn.exe 3388 inatwyxqd.exe 1168 inugvjlkd.exe 728 inwixlnmf.exe 3440 inzloqpih.exe 4488 innqsrkjz.exe 3060 inoavpdfe.exe 3888 inrdysgih.exe 1028 intfuikjc.exe 3996 ineuxonvv.exe 3040 injyqkarh.exe 2960 inefvmlzb.exe 1160 inwmpgfnn.exe 4740 inqcxrfhg.exe 3896 indskelwb.exe 1068 ingvnhoze.exe 1144 intcrvwiy.exe 3420 inzkcszdo.exe 2212 injhulmow.exe 4360 inmibthrw.exe 3996 inadbobmd.exe 3592 ingerepgv.exe 1532 inhwoipfi.exe 1592 inilcbjwj.exe 3748 inutvwllh.exe 5084 indxawycz.exe 4520 inbqostfv.exe 1588 infnwdvwr.exe 2748 ingvetxyk.exe 3088 inewrcnnk.exe 4944 inkivmnpx.exe 3584 incwvxbyn.exe -
Loads dropped DLL 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exeinvuwaxma.exeineybxzdp.exeinixpjqgj.exeinjmdckxk.exeinmeufqjy.exeinaphxbit.exeinomzqrdt.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exepid process 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 4596 inlsmacbt.exe 4596 inlsmacbt.exe 1796 inpsutmlb.exe 1796 inpsutmlb.exe 4564 insvxwpco.exe 4564 insvxwpco.exe 3636 innuocedv.exe 3636 innuocedv.exe 1752 invrckwrg.exe 1752 invrckwrg.exe 1276 inxtemyti.exe 1276 inxtemyti.exe 1356 inwhpwale.exe 1356 inwhpwale.exe 4392 inkzrlbas.exe 4392 inkzrlbas.exe 408 insohtodl.exe 408 insohtodl.exe 3616 incrjzdkv.exe 3616 incrjzdkv.exe 1120 inetlfmxc.exe 1120 inetlfmxc.exe 4060 inzvgovkd.exe 4060 inzvgovkd.exe 4324 inyjbrycn.exe 4324 inyjbrycn.exe 1328 inldtepix.exe 1328 inldtepix.exe 3432 inrngsnzc.exe 3432 inrngsnzc.exe 2484 inqtvunam.exe 2484 inqtvunam.exe 2820 inwsdlxsh.exe 2820 inwsdlxsh.exe 4564 insbquvhx.exe 4564 insbquvhx.exe 3112 inxiaqxbm.exe 3112 inxiaqxbm.exe 2900 ingvzmksi.exe 2900 ingvzmksi.exe 4100 inqmfrmyb.exe 4100 inqmfrmyb.exe 2276 invuwaxma.exe 2276 invuwaxma.exe 4556 ineybxzdp.exe 4556 ineybxzdp.exe 736 inixpjqgj.exe 736 inixpjqgj.exe 2792 injmdckxk.exe 2792 injmdckxk.exe 4076 inmeufqjy.exe 4076 inmeufqjy.exe 216 inaphxbit.exe 216 inaphxbit.exe 4188 inomzqrdt.exe 4188 inomzqrdt.exe 1388 infumgnyd.exe 1388 infumgnyd.exe 1792 inxjymong.exe 1792 inxjymong.exe 2900 inpleqlxa.exe 2900 inpleqlxa.exe -
Drops file in System32 directory 64 IoCs
Processes:
inngbnczn.exeinauwohze.exeinttrrtqn.exeinnezovdr.exeinyxgeiit.exeinzhpyfbx.exeinzhuwqpq.exeineamubie.exeinsahbdsg.exeinwfaehwj.exeingoxeawx.exeinbaqtkjr.exeinwonikuc.exeinsrzztuj.exeinuiyqbdi.exeinmibthrw.exeinlentqqz.exeinzemdeup.exeinpiqqmhr.exeinopzkhtd.exeinnqsqpku.exeinlisltat.exeinpeyhpif.exeinwtixaeq.exeinpkvggzd.exeinpdimgmm.exeincvyzsfr.exeinpedtegi.exeinskhcuqg.exeinpleqlxa.exeinuiybnpg.exeinoxlbteg.exeinhngmkjz.exeinnpkjuac.exeinonckooo.exeintcrvwiy.exeinewhnrej.exedescription ioc process File created C:\Windows\SysWOW64\inqjwwyse.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inrvczhwo.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\indwiftuf.exe File created C:\Windows\SysWOW64\inawcknai.exe inngbnczn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inauwohze.exe File created C:\Windows\SysWOW64\inlnqnzon.exe inttrrtqn.exe File created C:\Windows\SysWOW64\innxlswhx.exe File created C:\Windows\SysWOW64\inimthpzj.exe innezovdr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inyxgeiit.exe File opened for modification C:\Windows\SysWOW64\intsuvkkg.exe_lang.ini inzhpyfbx.exe File opened for modification C:\Windows\SysWOW64\inbsfowhf.exe_lang.ini inzhuwqpq.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ineamubie.exe File opened for modification C:\Windows\SysWOW64\syslog.dat insahbdsg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwfaehwj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat ingoxeawx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbaqtkjr.exe File created C:\Windows\SysWOW64\intjvbljd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\intygcqsp.exe File opened for modification C:\Windows\SysWOW64\injstffwi.exe_lang.ini File opened for modification C:\Windows\SysWOW64\invcsswdc.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat inwonikuc.exe File created C:\Windows\SysWOW64\inunawidf.exe File created C:\Windows\SysWOW64\inqpqfsux.exe File created C:\Windows\SysWOW64\inulkzdji.exe insrzztuj.exe File opened for modification C:\Windows\SysWOW64\incmrujul.exe_lang.ini inuiyqbdi.exe File created C:\Windows\SysWOW64\ingexjguv.exe File opened for modification C:\Windows\SysWOW64\inshgivmq.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inujfpcns.exe File created C:\Windows\SysWOW64\inadbobmd.exe inmibthrw.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inlentqqz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inluzuhet.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat inzemdeup.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpiqqmhr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inopzkhtd.exe File opened for modification C:\Windows\SysWOW64\inizrmbvn.exe_lang.ini innqsqpku.exe File created C:\Windows\SysWOW64\inyzyumms.exe File opened for modification C:\Windows\SysWOW64\inboqtdrp.exe_lang.ini inlisltat.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpeyhpif.exe File opened for modification C:\Windows\SysWOW64\ineqbmfxl.exe_lang.ini inwtixaeq.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inuloqrtx.exe inpkvggzd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpdimgmm.exe File created C:\Windows\SysWOW64\incajnuiq.exe incvyzsfr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpedtegi.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inskhcuqg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\invspsova.exe File opened for modification C:\Windows\SysWOW64\inortslka.exe_lang.ini inpleqlxa.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inuiybnpg.exe File created C:\Windows\SysWOW64\inoyokzfp.exe inoxlbteg.exe File created C:\Windows\SysWOW64\infrgacrf.exe inhngmkjz.exe File created C:\Windows\SysWOW64\infbnevol.exe innpkjuac.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inonckooo.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inltcfunl.exe File opened for modification C:\Windows\SysWOW64\inzkcszdo.exe_lang.ini intcrvwiy.exe File created C:\Windows\SysWOW64\incawvwly.exe inewhnrej.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
inbsbjtei.exeinuqbjvqf.exeindvjzcoq.exeinbpxnjbw.exeinvdmeyvk.exeinvlbrhjx.exeinekspwho.exeinrfpuysy.exeinmsevrki.exeintchxupt.exeinypsuvxw.exeintekobge.exeinnfajbav.exeinpkvggzd.exeinynjbljk.exeingxqnxqy.exeinvowdwcs.exeinaouaylq.exeinwtixaeq.exeintuwvzao.exeindlflxmo.exeincbzwztd.exeiniujiyjl.exeinlmnyysj.exeinngmlnpt.exeinzrqlnxa.exeincxuerhz.exeinwjfatav.exeinjwnoaqy.exeinujlcwuk.exeindwztgsi.exeinpdimgmm.exeinhwoipfi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inbsbjtei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inuqbjvqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indvjzcoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inbpxnjbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invdmeyvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invlbrhjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inekspwho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inrfpuysy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inmsevrki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intchxupt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inypsuvxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intekobge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innfajbav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpkvggzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inynjbljk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ingxqnxqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invowdwcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inaouaylq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwtixaeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intuwvzao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indlflxmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incbzwztd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iniujiyjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlmnyysj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inngmlnpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inzrqlnxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incxuerhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwjfatav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injwnoaqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inujlcwuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indwztgsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpdimgmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inhwoipfi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exeinvuwaxma.exeineybxzdp.exeinixpjqgj.exeinjmdckxk.exeinmeufqjy.exeinaphxbit.exeinomzqrdt.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exepid process 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 4596 inlsmacbt.exe 4596 inlsmacbt.exe 1796 inpsutmlb.exe 1796 inpsutmlb.exe 4564 insvxwpco.exe 4564 insvxwpco.exe 3636 innuocedv.exe 3636 innuocedv.exe 1752 invrckwrg.exe 1752 invrckwrg.exe 1276 inxtemyti.exe 1276 inxtemyti.exe 1356 inwhpwale.exe 1356 inwhpwale.exe 4392 inkzrlbas.exe 4392 inkzrlbas.exe 408 insohtodl.exe 408 insohtodl.exe 3616 incrjzdkv.exe 3616 incrjzdkv.exe 1120 inetlfmxc.exe 1120 inetlfmxc.exe 4060 inzvgovkd.exe 4060 inzvgovkd.exe 4324 inyjbrycn.exe 4324 inyjbrycn.exe 1328 inldtepix.exe 1328 inldtepix.exe 3432 inrngsnzc.exe 3432 inrngsnzc.exe 2484 inqtvunam.exe 2484 inqtvunam.exe 2820 inwsdlxsh.exe 2820 inwsdlxsh.exe 4564 insbquvhx.exe 4564 insbquvhx.exe 3112 inxiaqxbm.exe 3112 inxiaqxbm.exe 2900 ingvzmksi.exe 2900 ingvzmksi.exe 4100 inqmfrmyb.exe 4100 inqmfrmyb.exe 2276 invuwaxma.exe 2276 invuwaxma.exe 4556 ineybxzdp.exe 4556 ineybxzdp.exe 736 inixpjqgj.exe 736 inixpjqgj.exe 2792 injmdckxk.exe 2792 injmdckxk.exe 4076 inmeufqjy.exe 4076 inmeufqjy.exe 216 inaphxbit.exe 216 inaphxbit.exe 4188 inomzqrdt.exe 4188 inomzqrdt.exe 1388 infumgnyd.exe 1388 infumgnyd.exe 1792 inxjymong.exe 1792 inxjymong.exe 2900 inpleqlxa.exe 2900 inpleqlxa.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exeinvuwaxma.exeineybxzdp.exeinixpjqgj.exeinjmdckxk.exeinmeufqjy.exeinaphxbit.exeinomzqrdt.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeinwixlnmf.exeinzloqpih.exeinnqsrkjz.exeinoavpdfe.exeinrdysgih.exeintfuikjc.exeineuxonvv.exeinjyqkarh.exeinefvmlzb.exeinwmpgfnn.exeinqcxrfhg.exeindskelwb.exeingvnhoze.exeintcrvwiy.exeinzkcszdo.exeinjhulmow.exeinmibthrw.exeinadbobmd.exeingerepgv.exeinhwoipfi.exeinilcbjwj.exeinutvwllh.exeindxawycz.exeinbqostfv.exeinfnwdvwr.exeingvetxyk.exeinewrcnnk.exeinkivmnpx.exedescription pid process Token: SeDebugPrivilege 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe Token: SeDebugPrivilege 4596 inlsmacbt.exe Token: SeDebugPrivilege 1796 inpsutmlb.exe Token: SeDebugPrivilege 4564 insvxwpco.exe Token: SeDebugPrivilege 3636 innuocedv.exe Token: SeDebugPrivilege 1752 invrckwrg.exe Token: SeDebugPrivilege 1276 inxtemyti.exe Token: SeDebugPrivilege 1356 inwhpwale.exe Token: SeDebugPrivilege 4392 inkzrlbas.exe Token: SeDebugPrivilege 408 insohtodl.exe Token: SeDebugPrivilege 3616 incrjzdkv.exe Token: SeDebugPrivilege 1120 inetlfmxc.exe Token: SeDebugPrivilege 4060 inzvgovkd.exe Token: SeDebugPrivilege 4324 inyjbrycn.exe Token: SeDebugPrivilege 1328 inldtepix.exe Token: SeDebugPrivilege 3432 inrngsnzc.exe Token: SeDebugPrivilege 2484 inqtvunam.exe Token: SeDebugPrivilege 2820 inwsdlxsh.exe Token: SeDebugPrivilege 4564 insbquvhx.exe Token: SeDebugPrivilege 3112 inxiaqxbm.exe Token: SeDebugPrivilege 2900 ingvzmksi.exe Token: SeDebugPrivilege 4100 inqmfrmyb.exe Token: SeDebugPrivilege 2276 invuwaxma.exe Token: SeDebugPrivilege 4556 ineybxzdp.exe Token: SeDebugPrivilege 736 inixpjqgj.exe Token: SeDebugPrivilege 2792 injmdckxk.exe Token: SeDebugPrivilege 4076 inmeufqjy.exe Token: SeDebugPrivilege 216 inaphxbit.exe Token: SeDebugPrivilege 4188 inomzqrdt.exe Token: SeDebugPrivilege 1388 infumgnyd.exe Token: SeDebugPrivilege 1792 inxjymong.exe Token: SeDebugPrivilege 2900 inpleqlxa.exe Token: SeDebugPrivilege 2428 inortslka.exe Token: SeDebugPrivilege 2524 inruwvobn.exe Token: SeDebugPrivilege 3388 inatwyxqd.exe Token: SeDebugPrivilege 1168 inugvjlkd.exe Token: SeDebugPrivilege 728 inwixlnmf.exe Token: SeDebugPrivilege 3440 inzloqpih.exe Token: SeDebugPrivilege 4488 innqsrkjz.exe Token: SeDebugPrivilege 3060 inoavpdfe.exe Token: SeDebugPrivilege 3888 inrdysgih.exe Token: SeDebugPrivilege 1028 intfuikjc.exe Token: SeDebugPrivilege 3996 ineuxonvv.exe Token: SeDebugPrivilege 3040 injyqkarh.exe Token: SeDebugPrivilege 2960 inefvmlzb.exe Token: SeDebugPrivilege 1160 inwmpgfnn.exe Token: SeDebugPrivilege 4740 inqcxrfhg.exe Token: SeDebugPrivilege 3896 indskelwb.exe Token: SeDebugPrivilege 1068 ingvnhoze.exe Token: SeDebugPrivilege 1144 intcrvwiy.exe Token: SeDebugPrivilege 3420 inzkcszdo.exe Token: SeDebugPrivilege 2212 injhulmow.exe Token: SeDebugPrivilege 4360 inmibthrw.exe Token: SeDebugPrivilege 3996 inadbobmd.exe Token: SeDebugPrivilege 3592 ingerepgv.exe Token: SeDebugPrivilege 1532 inhwoipfi.exe Token: SeDebugPrivilege 1592 inilcbjwj.exe Token: SeDebugPrivilege 3748 inutvwllh.exe Token: SeDebugPrivilege 5084 indxawycz.exe Token: SeDebugPrivilege 4520 inbqostfv.exe Token: SeDebugPrivilege 1588 infnwdvwr.exe Token: SeDebugPrivilege 2748 ingvetxyk.exe Token: SeDebugPrivilege 3088 inewrcnnk.exe Token: SeDebugPrivilege 4944 inkivmnpx.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exeinvuwaxma.exeineybxzdp.exeinixpjqgj.exeinjmdckxk.exeinmeufqjy.exeinaphxbit.exepid process 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 4596 inlsmacbt.exe 1796 inpsutmlb.exe 4564 insvxwpco.exe 3636 innuocedv.exe 1752 invrckwrg.exe 1276 inxtemyti.exe 1356 inwhpwale.exe 4392 inkzrlbas.exe 408 insohtodl.exe 3616 incrjzdkv.exe 1120 inetlfmxc.exe 4060 inzvgovkd.exe 4324 inyjbrycn.exe 1328 inldtepix.exe 3432 inrngsnzc.exe 2484 inqtvunam.exe 2820 inwsdlxsh.exe 4564 insbquvhx.exe 3112 inxiaqxbm.exe 2900 ingvzmksi.exe 4100 inqmfrmyb.exe 2276 invuwaxma.exe 4556 ineybxzdp.exe 736 inixpjqgj.exe 2792 injmdckxk.exe 4076 inmeufqjy.exe 216 inaphxbit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinlsmacbt.exeinpsutmlb.exeinsvxwpco.exeinnuocedv.exeinvrckwrg.exeinxtemyti.exeinwhpwale.exeinkzrlbas.exeinsohtodl.exeincrjzdkv.exeinetlfmxc.exeinzvgovkd.exeinyjbrycn.exeinldtepix.exeinrngsnzc.exeinqtvunam.exeinwsdlxsh.exeinsbquvhx.exeinxiaqxbm.exeingvzmksi.exeinqmfrmyb.exedescription pid process target process PID 3704 wrote to memory of 4596 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inlsmacbt.exe PID 3704 wrote to memory of 4596 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inlsmacbt.exe PID 3704 wrote to memory of 4596 3704 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inlsmacbt.exe PID 4596 wrote to memory of 1796 4596 inlsmacbt.exe inpsutmlb.exe PID 4596 wrote to memory of 1796 4596 inlsmacbt.exe inpsutmlb.exe PID 4596 wrote to memory of 1796 4596 inlsmacbt.exe inpsutmlb.exe PID 1796 wrote to memory of 4564 1796 inpsutmlb.exe insbquvhx.exe PID 1796 wrote to memory of 4564 1796 inpsutmlb.exe insbquvhx.exe PID 1796 wrote to memory of 4564 1796 inpsutmlb.exe insbquvhx.exe PID 4564 wrote to memory of 3636 4564 insvxwpco.exe innuocedv.exe PID 4564 wrote to memory of 3636 4564 insvxwpco.exe innuocedv.exe PID 4564 wrote to memory of 3636 4564 insvxwpco.exe innuocedv.exe PID 3636 wrote to memory of 1752 3636 innuocedv.exe invrckwrg.exe PID 3636 wrote to memory of 1752 3636 innuocedv.exe invrckwrg.exe PID 3636 wrote to memory of 1752 3636 innuocedv.exe invrckwrg.exe PID 1752 wrote to memory of 1276 1752 invrckwrg.exe inxtemyti.exe PID 1752 wrote to memory of 1276 1752 invrckwrg.exe inxtemyti.exe PID 1752 wrote to memory of 1276 1752 invrckwrg.exe inxtemyti.exe PID 1276 wrote to memory of 1356 1276 inxtemyti.exe inwhpwale.exe PID 1276 wrote to memory of 1356 1276 inxtemyti.exe inwhpwale.exe PID 1276 wrote to memory of 1356 1276 inxtemyti.exe inwhpwale.exe PID 1356 wrote to memory of 4392 1356 inwhpwale.exe inkzrlbas.exe PID 1356 wrote to memory of 4392 1356 inwhpwale.exe inkzrlbas.exe PID 1356 wrote to memory of 4392 1356 inwhpwale.exe inkzrlbas.exe PID 4392 wrote to memory of 408 4392 inkzrlbas.exe insohtodl.exe PID 4392 wrote to memory of 408 4392 inkzrlbas.exe insohtodl.exe PID 4392 wrote to memory of 408 4392 inkzrlbas.exe insohtodl.exe PID 408 wrote to memory of 3616 408 insohtodl.exe incrjzdkv.exe PID 408 wrote to memory of 3616 408 insohtodl.exe incrjzdkv.exe PID 408 wrote to memory of 3616 408 insohtodl.exe incrjzdkv.exe PID 3616 wrote to memory of 1120 3616 incrjzdkv.exe inetlfmxc.exe PID 3616 wrote to memory of 1120 3616 incrjzdkv.exe inetlfmxc.exe PID 3616 wrote to memory of 1120 3616 incrjzdkv.exe inetlfmxc.exe PID 1120 wrote to memory of 4060 1120 inetlfmxc.exe inzvgovkd.exe PID 1120 wrote to memory of 4060 1120 inetlfmxc.exe inzvgovkd.exe PID 1120 wrote to memory of 4060 1120 inetlfmxc.exe inzvgovkd.exe PID 4060 wrote to memory of 4324 4060 inzvgovkd.exe inyjbrycn.exe PID 4060 wrote to memory of 4324 4060 inzvgovkd.exe inyjbrycn.exe PID 4060 wrote to memory of 4324 4060 inzvgovkd.exe inyjbrycn.exe PID 4324 wrote to memory of 1328 4324 inyjbrycn.exe inldtepix.exe PID 4324 wrote to memory of 1328 4324 inyjbrycn.exe inldtepix.exe PID 4324 wrote to memory of 1328 4324 inyjbrycn.exe inldtepix.exe PID 1328 wrote to memory of 3432 1328 inldtepix.exe inrngsnzc.exe PID 1328 wrote to memory of 3432 1328 inldtepix.exe inrngsnzc.exe PID 1328 wrote to memory of 3432 1328 inldtepix.exe inrngsnzc.exe PID 3432 wrote to memory of 2484 3432 inrngsnzc.exe inqtvunam.exe PID 3432 wrote to memory of 2484 3432 inrngsnzc.exe inqtvunam.exe PID 3432 wrote to memory of 2484 3432 inrngsnzc.exe inqtvunam.exe PID 2484 wrote to memory of 2820 2484 inqtvunam.exe inwsdlxsh.exe PID 2484 wrote to memory of 2820 2484 inqtvunam.exe inwsdlxsh.exe PID 2484 wrote to memory of 2820 2484 inqtvunam.exe inwsdlxsh.exe PID 2820 wrote to memory of 4564 2820 inwsdlxsh.exe insbquvhx.exe PID 2820 wrote to memory of 4564 2820 inwsdlxsh.exe insbquvhx.exe PID 2820 wrote to memory of 4564 2820 inwsdlxsh.exe insbquvhx.exe PID 4564 wrote to memory of 3112 4564 insbquvhx.exe inxiaqxbm.exe PID 4564 wrote to memory of 3112 4564 insbquvhx.exe inxiaqxbm.exe PID 4564 wrote to memory of 3112 4564 insbquvhx.exe inxiaqxbm.exe PID 3112 wrote to memory of 2900 3112 inxiaqxbm.exe ingvzmksi.exe PID 3112 wrote to memory of 2900 3112 inxiaqxbm.exe ingvzmksi.exe PID 3112 wrote to memory of 2900 3112 inxiaqxbm.exe ingvzmksi.exe PID 2900 wrote to memory of 4100 2900 ingvzmksi.exe inqmfrmyb.exe PID 2900 wrote to memory of 4100 2900 ingvzmksi.exe inqmfrmyb.exe PID 2900 wrote to memory of 4100 2900 ingvzmksi.exe inqmfrmyb.exe PID 4100 wrote to memory of 2276 4100 inqmfrmyb.exe invuwaxma.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4556 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe25⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:216 -
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe29⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3388 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:728 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3896 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3748 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3088 -
C:\Windows\SysWOW64\inkivmnpx.exeC:\Windows\system32\inkivmnpx.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe65⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe66⤵PID:2756
-
C:\Windows\SysWOW64\inertnmni.exeC:\Windows\system32\inertnmni.exe67⤵PID:2800
-
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe68⤵PID:4216
-
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe69⤵PID:3356
-
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe70⤵PID:2764
-
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe71⤵
- Boot or Logon Autostart Execution: Active Setup
PID:4764 -
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe72⤵PID:3500
-
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe73⤵PID:4712
-
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe74⤵PID:620
-
C:\Windows\SysWOW64\inftrnfcc.exeC:\Windows\system32\inftrnfcc.exe75⤵PID:804
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe76⤵
- Drops file in System32 directory
PID:5020 -
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe77⤵PID:4356
-
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe78⤵PID:5112
-
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe79⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe80⤵
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe81⤵PID:2964
-
C:\Windows\SysWOW64\inmxiifwj.exeC:\Windows\system32\inmxiifwj.exe82⤵PID:2444
-
C:\Windows\SysWOW64\iniqzgcyz.exeC:\Windows\system32\iniqzgcyz.exe83⤵PID:4920
-
C:\Windows\SysWOW64\inoxdfqoe.exeC:\Windows\system32\inoxdfqoe.exe84⤵PID:3888
-
C:\Windows\SysWOW64\infsuonoj.exeC:\Windows\system32\infsuonoj.exe85⤵PID:1540
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe86⤵PID:3016
-
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe87⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1792 -
C:\Windows\SysWOW64\inmnccutj.exeC:\Windows\system32\inmnccutj.exe88⤵PID:3752
-
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe89⤵PID:4012
-
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe90⤵PID:1856
-
C:\Windows\SysWOW64\indtosnaj.exeC:\Windows\system32\indtosnaj.exe91⤵PID:3012
-
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe92⤵PID:804
-
C:\Windows\SysWOW64\inbjwysrs.exeC:\Windows\system32\inbjwysrs.exe93⤵PID:728
-
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe94⤵PID:4528
-
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe95⤵PID:1544
-
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe96⤵PID:4816
-
C:\Windows\SysWOW64\inxrycagn.exeC:\Windows\system32\inxrycagn.exe97⤵PID:2616
-
C:\Windows\SysWOW64\inghxondz.exeC:\Windows\system32\inghxondz.exe98⤵PID:4496
-
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe99⤵PID:548
-
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe100⤵PID:3816
-
C:\Windows\SysWOW64\indlyubtu.exeC:\Windows\system32\indlyubtu.exe101⤵PID:1572
-
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe102⤵PID:1612
-
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe103⤵PID:3520
-
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe104⤵PID:1556
-
C:\Windows\SysWOW64\ingtvpopk.exeC:\Windows\system32\ingtvpopk.exe105⤵PID:2596
-
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe106⤵PID:2388
-
C:\Windows\SysWOW64\inhzrfkoi.exeC:\Windows\system32\inhzrfkoi.exe107⤵PID:2524
-
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe108⤵PID:4712
-
C:\Windows\SysWOW64\insaljfpw.exeC:\Windows\system32\insaljfpw.exe109⤵PID:2440
-
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe110⤵PID:1888
-
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe111⤵PID:2056
-
C:\Windows\SysWOW64\ineupaato.exeC:\Windows\system32\ineupaato.exe112⤵PID:2104
-
C:\Windows\SysWOW64\inbnjcuis.exeC:\Windows\system32\inbnjcuis.exe113⤵PID:4556
-
C:\Windows\SysWOW64\inooxsntm.exeC:\Windows\system32\inooxsntm.exe114⤵PID:1980
-
C:\Windows\SysWOW64\inthmqkqb.exeC:\Windows\system32\inthmqkqb.exe115⤵PID:640
-
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe116⤵PID:1896
-
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe117⤵PID:2444
-
C:\Windows\SysWOW64\inkuaczqt.exeC:\Windows\system32\inkuaczqt.exe118⤵PID:2756
-
C:\Windows\SysWOW64\inlcfvhzy.exeC:\Windows\system32\inlcfvhzy.exe119⤵PID:2484
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe120⤵PID:1028
-
C:\Windows\SysWOW64\inniyteex.exeC:\Windows\system32\inniyteex.exe121⤵PID:2708
-
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe122⤵PID:1608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-