Resubmissions
04-12-2024 19:44
241204-yftswatlcj 1028-11-2024 19:40
241128-ydqnfaxqgy 1020-11-2024 16:31
241120-t1tw6azjfy 1020-11-2024 06:05
241120-gtdv5ssnes 1020-11-2024 06:00
241120-gqchxascje 1020-11-2024 05:52
241120-gk2kvaxkgn 1018-11-2024 21:54
241118-1sd93a1lfr 1017-11-2024 11:03
241117-m55qwsyemr 316-11-2024 19:06
241116-xsbmdssbkd 1016-11-2024 18:38
241116-w913ya1jcy 10Analysis
-
max time kernel
674s -
max time network
838s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-11-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
rondtimes.top:1940
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/RpncwxSs
Extracted
phorphiex
http://185.215.113.66
http://185.215.113.84
-
mutex
Klipux
Extracted
quasar
1.4.1
Java
dez345-37245.portmap.host:37245
f0e53bcd-851e-44af-8fd5-07d8ab5ed968
-
encryption_key
65439CE7DEF3E0FAF01C526FEA90388C9FD487A1
-
install_name
java.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java ©
-
subdirectory
Programfiles
Extracted
lokibot
http://94.156.177.41/maxzi/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
cobaltstrike
http://192.168.180.12:7810/vN3f
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322)
Extracted
stealc
LogsDiller
http://194.15.46.65
-
url_path
/7f031eb0d257b290.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
62.113.117.95:4449
hwelcvbupaqfzors
-
delay
10
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
Aryszx
Apichat:4782
181f4a12-4cad-46a9-9896-1001033c5b69
-
encryption_key
F4F359BEF442D9221F73F7D64267E0E300CC68CE
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Runtime Broker
Extracted
asyncrat
0.5.8
Default
stuff-data.gl.at.ply.gg:54296
u81wDUVoFHib
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
redline
Diamotrix
176.111.174.140:1912
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Extracted
gurcu
https://api.telegram.org/bot962023231:AAG4by19NbHDMl2hPuMLesCOvrR264-4hSg/sendMessag
https://api.telegram.org/bot7414426785:AAGjcWvGORe1_ToCk6Lpu9MSjNamkIOlrLs/sendDocumen
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Knapck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kndmikcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fpgkjoek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfhlmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmncegdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdhafmio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijcofp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbgbnona.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mdkhidoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abimfcid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cijdjjlf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ellfcbkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fepkgfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lehofj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Khhoah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldhblgop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aihonllk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idamci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ndbnic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lhcgbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgneqbfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bealhmpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnpeobpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Injalo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jafjihle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfebno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmijjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olbiqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dlbcmdco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dlgmhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcppqe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bealhmpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fpjhpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iamgcjdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhkndbcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nogbgl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofpgdd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bejoolhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfjliooe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbjodn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iedihiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kecekkjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkqpam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ooohgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdanhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldhblgop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eekalg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eleiiabj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdopfigj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcfhfjdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmoefn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldlempgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ncqaakbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Didgqhdk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icifje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kegoefqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dgjdpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmlhqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdhdio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbgiga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqanqnmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjgokagq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfkail32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lelhajbm.exe -
Asyncrat family
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Berbew family
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral2/files/0x002d00000004506e-157.dat family_xworm behavioral2/memory/644-167-0x0000000000CC0000-0x0000000000CD8000-memory.dmp family_xworm behavioral2/files/0x002e000000045209-993.dat family_xworm behavioral2/memory/4616-1001-0x0000000000DD0000-0x0000000000DE4000-memory.dmp family_xworm behavioral2/files/0x001b000000045986-14221.dat family_xworm behavioral2/files/0x00140000000459a9-14543.dat family_xworm -
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral2/files/0x002b000000045223-1245.dat zharkcore behavioral2/files/0x003300000004521a-1418.dat zharkcore -
Gurcu family
-
Lokibot family
-
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe -
Phorphiex family
-
Phorphiex payload 4 IoCs
resource yara_rule behavioral2/files/0x0028000000045051-24.dat family_phorphiex behavioral2/files/0x0029000000045052-116.dat family_phorphiex behavioral2/files/0x0029000000045213-1056.dat family_phorphiex behavioral2/files/0x001b00000004598d-14515.dat family_phorphiex -
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral2/files/0x002800000004509f-351.dat family_quasar behavioral2/memory/1004-361-0x0000000000410000-0x000000000075E000-memory.dmp family_quasar behavioral2/files/0x0028000000045220-1149.dat family_quasar behavioral2/memory/5680-1157-0x0000000000960000-0x0000000000C84000-memory.dmp family_quasar behavioral2/files/0x001b000000045955-14205.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0028000000045242-1356.dat family_redline behavioral2/memory/4028-1373-0x00000000001E0000-0x0000000000232000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 1484 created 3648 1484 3463530481.exe 57 PID 1484 created 3648 1484 3463530481.exe 57 PID 116 created 3648 116 winupsecvmgr.exe 57 PID 116 created 3648 116 winupsecvmgr.exe 57 PID 116 created 3648 116 winupsecvmgr.exe 57 PID 7036 created 3648 7036 rstxdhuj.exe 57 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe -
XMRig Miner payload 20 IoCs
resource yara_rule behavioral2/memory/116-399-0x00007FF7C4A90000-0x00007FF7C5027000-memory.dmp xmrig behavioral2/memory/2696-414-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-430-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-488-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-499-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-673-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-750-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-761-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-776-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-820-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-845-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-850-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-890-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-897-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-922-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-959-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/2696-975-0x00007FF748080000-0x00007FF74886F000-memory.dmp xmrig behavioral2/memory/3804-1057-0x0000000000650000-0x0000000000C82000-memory.dmp xmrig behavioral2/files/0x002b00000004546a-14306.dat family_xmrig behavioral2/files/0x002b00000004546a-14306.dat xmrig -
Xmrig family
-
Xworm family
-
Zharkbot family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x002b00000004522e-1267.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ven_protected.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 8580 bcdedit.exe 8636 bcdedit.exe -
Renames multiple (3412) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 64 IoCs
flow pid Process 508 4532 rundll32.exe 517 4532 rundll32.exe 518 4532 rundll32.exe 519 4532 rundll32.exe 528 4532 rundll32.exe 529 4532 rundll32.exe 542 4532 rundll32.exe 543 4532 rundll32.exe 544 4532 rundll32.exe 570 4532 rundll32.exe 571 4532 rundll32.exe 589 4532 rundll32.exe 591 4532 rundll32.exe 592 4532 rundll32.exe 606 4532 rundll32.exe 607 4532 rundll32.exe 619 4532 rundll32.exe 626 4532 rundll32.exe 627 4532 rundll32.exe 644 4532 rundll32.exe 651 4532 rundll32.exe 656 4532 rundll32.exe 658 4532 rundll32.exe 668 4532 rundll32.exe 670 4532 rundll32.exe 679 4532 rundll32.exe 685 4532 rundll32.exe 686 4532 rundll32.exe 698 4532 rundll32.exe 701 4532 rundll32.exe 707 4532 rundll32.exe 717 4532 rundll32.exe 720 4532 rundll32.exe 730 4532 rundll32.exe 732 4532 rundll32.exe 733 4532 rundll32.exe 745 4532 rundll32.exe 747 4532 rundll32.exe 761 4532 rundll32.exe 765 4532 rundll32.exe 767 4532 rundll32.exe 789 4532 rundll32.exe 790 4532 rundll32.exe 800 4532 rundll32.exe 801 4532 rundll32.exe 805 4532 rundll32.exe 813 4532 rundll32.exe 815 4532 rundll32.exe 824 4532 rundll32.exe 825 4532 rundll32.exe 827 4532 rundll32.exe 835 4532 rundll32.exe 839 4532 rundll32.exe 848 4532 rundll32.exe 849 4532 rundll32.exe 852 4532 rundll32.exe 868 4532 rundll32.exe 869 4532 rundll32.exe 893 4532 rundll32.exe 894 4532 rundll32.exe 898 4532 rundll32.exe 909 4532 rundll32.exe 911 4532 rundll32.exe 915 4532 rundll32.exe -
pid Process 2232 powershell.exe 2076 powershell.exe 8760 powershell.exe 9548 powershell.exe 6728 powershell.exe 7584 powershell.exe 9196 powershell.exe 3180 powershell.exe 4276 powershell.exe 2280 powershell.exe 11080 powershell.exe 1140 powershell.exe 1224 powershell.exe 11284 powershell.exe 2416 powershell.exe 440 powershell.exe 11240 powershell.exe 3640 powershell.exe 7936 powershell.exe 12268 powershell.exe 8448 powershell.exe 10316 powershell.exe 2212 powershell.exe 2140 powershell.exe 2432 powershell.exe 9124 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 3756 netsh.exe 9496 netsh.exe 9068 netsh.exe 3664 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\x856732\Parameters\ServiceDll = "C:\\Windows\\System32\\x856732.dat" reg.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " meshagent32-group.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ven_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ven_protected.exe -
Checks computer location settings 2 TTPs 46 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation 302485988.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Webster.pif Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation sysvplervcs.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation 726420428.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation dccrypt.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation InfluencedNervous.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation uctgkfb7.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Nework.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation cabal.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation 3347726980.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation lastest.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation freedom.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation sysklnorbcv.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation sysarddrvs.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation caspol.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation sysklnorbcv.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Runtime Broker.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\65449e22560e51e0740c2a10dc6c9c59.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\65449e22560e51e0740c2a10dc6c9c59.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk uctgkfb7.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk uctgkfb7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk freedom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 3312 cabal.exe 4412 5.exe 3176 sysklnorbcv.exe 2920 update.exe 3676 11.exe 4560 sysarddrvs.exe 644 XClient.exe 656 lastest.exe 4236 Launcher.exe 1580 svchost.exe 4584 726420428.exe 1584 3275911949.exe 4536 XClient.exe 972 93424183.exe 1484 3463530481.exe 1932 759028573.exe 116 winupsecvmgr.exe 3180 svhosts.exe 1004 Java32.exe 1168 caspol.exe 2220 java.exe 5076 302485988.exe 440 2297530278.exe 1348 caspol.exe 704 3238922919.exe 2204 XClient.exe 1128 2256514898.exe 4816 networks_profile.exe 1916 7z.exe 1976 networks_profile.exe 1116 service.exe 5760 2995323471.exe 5880 dccrypt.exe 5296 sysnldcvmr.exe 5984 XClient.exe 3880 cryyy.exe 5128 PCSupport.exe 5344 winvnc.exe 5836 Vidar.exe 6000 3347726980.exe 3240 Portwebwin.exe 4408 XClient.exe 4936 106815289.exe 4072 17824204.exe 5880 t2.exe 4616 uctgkfb7.exe 2344 2416025277.exe 6036 pei.exe 3804 ven_protected.exe 5964 199076676.exe 1980 XClient.exe 848 Windows.exe 5244 41m98slk.exe 5832 newtpp.exe 5680 Client-built.exe 740 ConsoleApp2.exe 972 Runtime Broker.exe 1672 Runtime Broker.exe 1608 XClient.exe 984 Windows.exe 3912 Unit.exe 3520 Installeraus.exe 3992 Loader.exe 6020 meshagent32-group.exe -
Loads dropped DLL 39 IoCs
pid Process 1976 networks_profile.exe 1976 networks_profile.exe 1976 networks_profile.exe 1976 networks_profile.exe 1976 networks_profile.exe 1976 networks_profile.exe 4480 Applaunch.exe 4532 rundll32.exe 5124 5B04.tmp.zx.exe 5124 5B04.tmp.zx.exe 5124 5B04.tmp.zx.exe 5124 5B04.tmp.zx.exe 5124 5B04.tmp.zx.exe 8048 printui.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7488 svchost.exe 7392 console_zero.exe 7392 console_zero.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 7144 MS14-068.exe 6476 BaddStore.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x002b000000045210-1047.dat themida behavioral2/memory/3804-1061-0x0000000000650000-0x0000000000C82000-memory.dmp themida behavioral2/memory/3804-1062-0x0000000000650000-0x0000000000C82000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysklnorbcv.exe" 5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 11.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\1A4DA87E8CC23468552849\\1A4DA87E8CC23468552849.exe" audiodg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\Windows.exe" freedom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" aspnet_regiis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\65449e22560e51e0740c2a10dc6c9c59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 2995323471.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\1A4DA87E8CC23468552849\\1A4DA87E8CC23468552849.exe" MJPVgHw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\1A4DA87E8CC23468552849\\1A4DA87E8CC23468552849.exe" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65449e22560e51e0740c2a10dc6c9c59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysklnorbcv.exe" 6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\Windows.exe" uctgkfb7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ylrdnrwcx = "C:\\Users\\Admin\\AppData\\Roaming\\Ylrdnrwcx.exe" rstxdhuj.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ven_protected.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI AvosLocker.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: server.exe File opened (read-only) \??\e: server.exe File opened (read-only) \??\k: server.exe File opened (read-only) \??\r: server.exe File opened (read-only) \??\w: server.exe File opened (read-only) \??\q: server.exe File opened (read-only) \??\t: server.exe File opened (read-only) \??\u: server.exe File opened (read-only) \??\b: server.exe File opened (read-only) \??\j: server.exe File opened (read-only) \??\l: server.exe File opened (read-only) \??\m: server.exe File opened (read-only) \??\y: server.exe File opened (read-only) \??\Z: AvosLocker.exe File opened (read-only) \??\Z: Explorer.EXE File opened (read-only) \??\g: server.exe File opened (read-only) \??\h: server.exe File opened (read-only) \??\i: server.exe File opened (read-only) \??\v: server.exe File opened (read-only) \??\s: server.exe File opened (read-only) \??\x: server.exe File opened (read-only) \??\a: server.exe File opened (read-only) \??\n: server.exe File opened (read-only) \??\o: server.exe File opened (read-only) \??\p: server.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 7976 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 977 raw.githubusercontent.com 48 raw.githubusercontent.com 501 raw.githubusercontent.com 943 raw.githubusercontent.com 948 raw.githubusercontent.com 955 raw.githubusercontent.com 47 raw.githubusercontent.com 62 pastebin.com 63 pastebin.com 883 raw.githubusercontent.com 1357 raw.githubusercontent.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 853 ipinfo.io 854 ipinfo.io 1095 ip-api.com 1191 api.ipify.org 1192 api.ipify.org -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 64 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3752 powercfg.exe 4136 powercfg.exe 10288 powercfg.exe 11140 powercfg.exe 11500 powercfg.exe 5524 powercfg.exe 10956 powercfg.exe 7456 powercfg.exe 6432 powercfg.exe 9984 powercfg.exe 9060 powercfg.exe 11528 powercfg.exe 7612 powercfg.exe 2952 powercfg.exe 1784 powercfg.exe 9524 powercfg.exe 11548 powercfg.exe 6796 powercfg.exe 10636 powercfg.exe 11152 powercfg.exe 11528 powercfg.exe 9708 powercfg.exe 5760 powercfg.exe 10064 powercfg.exe 4976 powercfg.exe 7680 powercfg.exe 7456 powercfg.exe 10592 powercfg.exe 8928 powercfg.exe 6168 powercfg.exe 11364 powercfg.exe 3640 powercfg.exe 9292 powercfg.exe 5672 powercfg.exe 6788 powercfg.exe 8268 powercfg.exe 2124 powercfg.exe 2892 powercfg.exe 2664 powercfg.exe 304 powercfg.exe 6948 powercfg.exe 8096 powercfg.exe 2916 powercfg.exe 316 powercfg.exe 10612 powercfg.exe 7416 powercfg.exe 4816 powercfg.exe 7240 powercfg.exe 2524 powercfg.exe 6468 powercfg.exe 10908 powercfg.exe 6552 powercfg.exe 8324 powercfg.exe 6436 powercfg.exe 9396 powercfg.exe 10520 powercfg.exe 10592 powercfg.exe 4360 powercfg.exe 2260 powercfg.exe 6944 powercfg.exe 8824 powercfg.exe 5372 powercfg.exe 9808 powercfg.exe 7648 powercfg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 server.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf svchost.exe File opened for modification C:\autorun.inf svchost.exe File created D:\autorun.inf svchost.exe File created F:\autorun.inf svchost.exe File opened for modification F:\autorun.inf svchost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Iekgkljm.dll Oclamjhf.exe File created C:\Windows\SysWOW64\Ihflpedk.dll Didgqhdk.exe File created C:\Windows\SysWOW64\Lnhhdgln.dll Fdhafmio.exe File opened for modification C:\Windows\SysWOW64\Gfpcnd32.exe Glhoeobd.exe File opened for modification C:\Windows\SysWOW64\Megabadd.exe Monifg32.exe File opened for modification C:\Windows\SysWOW64\Lbgfdo32.exe Kecekkjh.exe File opened for modification C:\Windows\SysWOW64\Cmhmqhbl.exe Cdpigbll.exe File created C:\Windows\SysWOW64\Jogeoc32.dll Ecjhklnl.exe File opened for modification C:\Windows\SysWOW64\Kegoefqi.exe Jnmghl32.exe File opened for modification C:\Windows\SysWOW64\Dgjdpl32.exe Ddlhca32.exe File created C:\Windows\SysWOW64\Jamenlhc.dll Echkelpo.exe File opened for modification C:\Windows\SysWOW64\Kampjg32.exe Kfhlmo32.exe File created C:\Windows\SysWOW64\Acoabf32.dll Lelhajbm.exe File opened for modification C:\Windows\SysWOW64\Emnpbepd.exe Echkelpo.exe File created C:\Windows\SysWOW64\Imonmknj.exe Iedihiao.exe File created C:\Windows\SysWOW64\Lelagcna.exe Lmdiffno.exe File created C:\Windows\SysWOW64\Bggpoofk.dll Moiokhql.exe File created C:\Windows\SysWOW64\Odidjbbj.exe Nchhbj32.exe File created C:\Windows\SysWOW64\Lfnmhp32.dll Pijbmnhk.exe File created C:\Windows\SysWOW64\Jbalcq32.dll Fjppcdkk.exe File created C:\Windows\SysWOW64\Bnkmlc32.dll Hmoefn32.exe File opened for modification C:\Windows\SysWOW64\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Hmhhll32.exe Hjjlpa32.exe File created C:\Windows\SysWOW64\Gfpcnd32.exe Glhoeobd.exe File opened for modification C:\Windows\SysWOW64\Hjpijb32.exe Gmlhqn32.exe File created C:\Windows\SysWOW64\Hmoefn32.exe Hjpijb32.exe File created C:\Windows\SysWOW64\Lopleiig.exe Lfhdclhe.exe File created C:\Windows\SysWOW64\Icbpiflo.exe Hmhhll32.exe File created C:\Windows\SysWOW64\Mhejfpno.dll Kfhlmo32.exe File created C:\Windows\SysWOW64\Kndmikcd.exe Khjela32.exe File created C:\Windows\SysWOW64\Nhhgfb32.dll Mdhdio32.exe File opened for modification C:\Windows\SysWOW64\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kopjhb32.exe exe003.exe File created C:\Windows\SysWOW64\Aeemmojj.exe Qmjhhlmo.exe File created C:\Windows\SysWOW64\Iebiao32.dll Epioiaak.exe File created C:\Windows\SysWOW64\Gcokmild.exe Gqanqnmp.exe File opened for modification C:\Windows\SysWOW64\Hjebeaic.exe Hggfifjp.exe File created C:\Windows\SysWOW64\Pijokgal.dll Hjjlpa32.exe File created C:\Windows\SysWOW64\Kaemem32.exe Klhdmf32.exe File opened for modification C:\Windows\SysWOW64\Bdicgc32.exe Bmojjijg.exe File created C:\Windows\SysWOW64\Glnindan.dll Ellfcbkd.exe File created C:\Windows\SysWOW64\Fndfcd32.exe Egjnfjbp.exe File created C:\Windows\SysWOW64\Cdpigbll.exe Cliafekj.exe File created C:\Windows\SysWOW64\Hjjlpa32.exe Hdmchj32.exe File created C:\Windows\SysWOW64\Jafjihle.exe Jgneqbfe.exe File opened for modification C:\Windows\SysWOW64\Knapck32.exe Kcllfb32.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb MeshAgent.exe File created C:\Windows\SysWOW64\Nldmpamj.exe Maohbimd.exe File opened for modification C:\Windows\SysWOW64\Nhkndbcn.exe Naaehhka.exe File created C:\Windows\SysWOW64\Namiblbl.dll Blmakgeg.exe File opened for modification C:\Windows\SysWOW64\Knfjokab.exe Kdqeabal.exe File created C:\Windows\SysWOW64\Ajaljq32.dll Lfckhm32.exe File created C:\Windows\SysWOW64\Lcegfehg.dll Bcppqe32.exe File created C:\Windows\SysWOW64\Ejndlafc.dll Bdicgc32.exe File created C:\Windows\SysWOW64\Jbnoae32.dll Jgneqbfe.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Nldmpamj.exe Maohbimd.exe File created C:\Windows\SysWOW64\Oclamjhf.exe Olbiqp32.exe File opened for modification C:\Windows\SysWOW64\Pbidoe32.exe Pmllgn32.exe File created C:\Windows\SysWOW64\Lcjccnbf.dll Nkqpam32.exe File created C:\Windows\SysWOW64\Ilmdpcll.dll Cijdjjlf.exe File opened for modification C:\Windows\SysWOW64\Diknag32.exe Dlgmhc32.exe File created C:\Windows\SysWOW64\Ggfmbhhb.exe Fdhafmio.exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 3720 tasklist.exe 5180 tasklist.exe 12008 tasklist.exe 11920 tasklist.exe 9276 tasklist.exe 9200 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1400121601.png" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3804 ven_protected.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 3180 set thread context of 4400 3180 svhosts.exe 157 PID 116 set thread context of 3604 116 winupsecvmgr.exe 165 PID 116 set thread context of 2696 116 winupsecvmgr.exe 168 PID 1168 set thread context of 1348 1168 caspol.exe 178 PID 5836 set thread context of 4480 5836 Vidar.exe 251 PID 5984 set thread context of 5456 5984 MJPVgHw.exe 294 PID 5984 set thread context of 2732 5984 MJPVgHw.exe 295 PID 5984 set thread context of 6028 5984 MJPVgHw.exe 296 PID 4404 set thread context of 984 4404 343dsxs.exe 358 PID 7648 set thread context of 1712 7648 300.exe 656 PID 6336 set thread context of 6580 6336 18ijuw13.exe 666 PID 10832 set thread context of 1624 10832 xworm.exe 758 PID 7036 set thread context of 4920 7036 rstxdhuj.exe 768 PID 6476 set thread context of 5372 6476 BaddStore.exe 936 -
resource yara_rule behavioral2/files/0x001a000000045983-14180.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\manifest.xml AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013.dotx AvosLocker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\PipelineSegments.store AvosLocker.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\StoreLogo.png AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] AvosLocker.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui AvosLocker.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Custom.propdesc AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Notifications\SoftLandingAssetDark.gif.DATA AvosLocker.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\MSFT_PackageManagement.schema.mfl AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\db2v0801.xsl AvosLocker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\flat_officeFontsPreview.ttf AvosLocker.exe File created C:\Program Files (x86)\Windows Defender\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\MSFT_PackageManagement.schema.mfl AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui AvosLocker.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\PhotoViewer.dll.mui AvosLocker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui AvosLocker.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyDrop32x32.gif AvosLocker.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\jpeg_fx.md AvosLocker.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\THMBNAIL.PNG AvosLocker.exe File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\855D09DA-A643-4181-B340-D3086D3F9FCC\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\FREN\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\PREVIEW.GIF AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.TLB AvosLocker.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui AvosLocker.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg AvosLocker.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\Describe.snippets.ps1xml AvosLocker.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml AvosLocker.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\MSFT_PackageManagementSource.strings.psd1 AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\hu.pak AvosLocker.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files\Microsoft Office\root\Licenses16\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightRegular.ttf AvosLocker.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-100.png AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART1.BDR AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymxl.ttf AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Georgia.xml AvosLocker.exe File opened for modification C:\Program Files\Java\jre-1.8\README.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\rtscom.dll.mui AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\TipRes.dll.mui AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMXL.TTF AvosLocker.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html AvosLocker.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL093.XML AvosLocker.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\eu.pak.DATA AvosLocker.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\PSGet.Resource.psd1 AvosLocker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml AvosLocker.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\GET_YOUR_FILES_BACK.txt AvosLocker.exe -
Drops file in Windows directory 36 IoCs
description ioc Process File opened for modification C:\Windows\BenefitBackup InfluencedNervous.exe File opened for modification C:\Windows\NtOperations InfluencedNervous.exe File opened for modification C:\Windows\MetBlake InfluencedNervous.exe File opened for modification C:\Windows\AdsAsp InfluencedNervous.exe File opened for modification C:\Windows\HeatedTimothy InfluencedNervous.exe File opened for modification C:\Windows\ChuckVoltage InfluencedNervous.exe File opened for modification C:\Windows\SingleOxford InfluencedNervous.exe File created C:\Windows\sysklnorbcv.exe 5.exe File created C:\Windows\sysnldcvmr.exe 2995323471.exe File created C:\Windows\sysvplervcs.exe r.exe File opened for modification C:\Windows\sysarddrvs.exe 11.exe File opened for modification C:\Windows\NetExciting InfluencedNervous.exe File opened for modification C:\Windows\DefinedDrill InfluencedNervous.exe File opened for modification C:\Windows\WindowsAlberta InfluencedNervous.exe File opened for modification C:\Windows\SeasShadow InfluencedNervous.exe File opened for modification C:\Windows\BrickFin InfluencedNervous.exe File opened for modification C:\Windows\SeattleNuke InfluencedNervous.exe File opened for modification C:\Windows\WinningNative InfluencedNervous.exe File opened for modification C:\Windows\BlondKatrina InfluencedNervous.exe File opened for modification C:\Windows\FieldAnalyses InfluencedNervous.exe File opened for modification C:\Windows\MeshUpdating InfluencedNervous.exe File opened for modification C:\Windows\NhlPhrases InfluencedNervous.exe File opened for modification C:\Windows\OverheadSolutions InfluencedNervous.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File opened for modification C:\Windows\sysklnorbcv.exe 5.exe File opened for modification C:\Windows\AssuranceRequirements InfluencedNervous.exe File opened for modification C:\Windows\PlayersSite InfluencedNervous.exe File opened for modification C:\Windows\AirfareGambling InfluencedNervous.exe File created C:\Windows\sysklnorbcv.exe 6.exe File opened for modification C:\Windows\sysvplervcs.exe r.exe File opened for modification C:\Windows\ErikOccasionally InfluencedNervous.exe File opened for modification C:\Windows\SponsorDpi InfluencedNervous.exe File opened for modification C:\Windows\FindingsFor InfluencedNervous.exe File opened for modification C:\Windows\AtlasAdvantages InfluencedNervous.exe File created C:\Windows\sysarddrvs.exe 11.exe File opened for modification C:\Windows\sysnldcvmr.exe 2995323471.exe -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2280 sc.exe 2880 sc.exe 7580 sc.exe 8932 sc.exe 9572 sc.exe 456 sc.exe 2212 sc.exe 2188 sc.exe 7464 sc.exe 11292 sc.exe 9408 sc.exe 252 sc.exe 5492 sc.exe 2140 sc.exe 4160 sc.exe 2240 sc.exe 7720 sc.exe 11704 sc.exe 9120 sc.exe 4468 sc.exe 6524 sc.exe 4008 sc.exe 2628 sc.exe 1672 sc.exe 3288 sc.exe 7548 sc.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral2/files/0x002a0000000450a5-504.dat pyinstaller behavioral2/files/0x002a00000004527a-1432.dat pyinstaller behavioral2/files/0x002600000004545c-2882.dat pyinstaller behavioral2/files/0x001d000000045988-14715.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x002d000000045285-1683.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 2724 3880 WerFault.exe 220 448 5244 WerFault.exe 257 3172 3912 WerFault.exe 286 1796 3780 WerFault.exe 305 7100 1712 WerFault.exe 656 6488 6336 WerFault.exe 649 7956 10832 WerFault.exe 756 9820 300 WerFault.exe 1175 1988 4208 WerFault.exe 927 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Egjnfjbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaplpgdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knfjokab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45E5.tmp.x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Glcejo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xworm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dlgmhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcfhfjdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnniic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofpgdd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmnhmn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pijbmnhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amehdkbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moiokhql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmablm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mgagjkpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Obanofmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfngidkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifjokqbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aicecm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idamci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcgbkcif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18ijuw13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3238922919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmmndj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmhhll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnmghl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kopjhb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oclamjhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emkcme32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hqokbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdhdio32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaemem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdfone32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lopleiig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aloeii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeopcmbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbjodn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdhafmio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfkail32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lastest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3333212685.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbgiga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdbemb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkkfej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Monifg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caspol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeemmojj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cppcldgh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 34 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 9788 PING.EXE 2856 PING.EXE 5816 PING.EXE 2592 PING.EXE 5220 PING.EXE 11512 PING.EXE 2108 PING.EXE 3004 PING.EXE 10044 PING.EXE 11356 PING.EXE 7496 PING.EXE 9752 PING.EXE 5256 PING.EXE 11912 PING.EXE 6500 PING.EXE 3044 PING.EXE 5852 PING.EXE 7436 PING.EXE 4496 PING.EXE 7428 PING.EXE 7000 PING.EXE 10268 PING.EXE 9648 PING.EXE 5208 PING.EXE 6472 PING.EXE 1716 PING.EXE 5500 PING.EXE 6468 PING.EXE 6640 PING.EXE 12140 PING.EXE 3520 PING.EXE 7468 PING.EXE 6880 PING.EXE 6996 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 656 netsh.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5_6190317556063017550.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Applaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cryyy.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5_6190317556063017550.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Webster.pif Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cryyy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Webster.pif -
Delays execution with timeout.exe 6 IoCs
pid Process 4740 timeout.exe 2436 timeout.exe 6976 timeout.exe 7772 timeout.exe 6960 timeout.exe 5776 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 8564 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 4640 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oclamjhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pmnhmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cmkjfhpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fcfhfjdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncjgkblh.dll" Klhdmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Klhdmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgkgjmej.dll" Kaemem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djmcanog.dll" Kecekkjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nogbgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ofpgdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgeofk32.dll" Pmllgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpifbcom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dihalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Enplhenb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongkam32.dll" Jglhkchh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Klhdmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkoekilh.dll" Qeqcao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abimfcid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcmlml32.dll" Dekhei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hqokbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmdiffno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mdanhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nfdgif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpfebflj.dll" Obanofmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cppcldgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gnpeobpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klflfcap.dll" Gcmnginf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifcika32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eaegmoog.dll" Injalo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ijcofp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jepidgga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mcbepm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mdfone32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nfdgif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eeidggmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jndolald.dll" Fgdqmije.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pbidoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hogkea32.dll" Ddlhca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dgjdpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eekalg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fpgkjoek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Codpme32.dll" Kdqeabal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cennecfh.dll" Mdfone32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qmjhhlmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghbdbc32.dll" Aloeii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Epioiaak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lciaod32.dll" Gfbpdd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jglhkchh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhejfpno.dll" Kfhlmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcokjc32.dll" Mlimccgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aicecm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phhhdh32.dll" Hjpijb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jglhkchh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Knapck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgfqej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aeemmojj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dlgmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phihcocj.dll" Mhfmomch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohjihfji.dll" Lbgfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpklompi.dll" Lhhhhecc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hjpijb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmoefn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajaljq32.dll" Lfckhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aihonllk.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 7548 reg.exe -
Runs ping.exe 1 TTPs 34 IoCs
pid Process 2108 PING.EXE 2592 PING.EXE 7468 PING.EXE 10268 PING.EXE 7496 PING.EXE 7436 PING.EXE 11356 PING.EXE 6880 PING.EXE 6996 PING.EXE 5816 PING.EXE 7428 PING.EXE 4496 PING.EXE 11512 PING.EXE 2856 PING.EXE 6468 PING.EXE 12140 PING.EXE 5208 PING.EXE 6640 PING.EXE 1716 PING.EXE 3004 PING.EXE 5256 PING.EXE 7000 PING.EXE 9788 PING.EXE 10044 PING.EXE 3044 PING.EXE 5220 PING.EXE 9752 PING.EXE 11912 PING.EXE 6500 PING.EXE 3520 PING.EXE 5852 PING.EXE 6472 PING.EXE 5500 PING.EXE 9648 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5124 schtasks.exe 5884 schtasks.exe 4040 schtasks.exe 4812 schtasks.exe 704 schtasks.exe 1472 schtasks.exe 8096 schtasks.exe 4708 schtasks.exe 11892 schtasks.exe 9872 schtasks.exe 11484 schtasks.exe 5356 schtasks.exe 5440 schtasks.exe 10612 schtasks.exe 4488 schtasks.exe 4984 schtasks.exe 10436 schtasks.exe 852 schtasks.exe 2348 schtasks.exe 5324 schtasks.exe 4172 schtasks.exe 3112 schtasks.exe 2208 schtasks.exe 3780 schtasks.exe 4080 schtasks.exe 5832 schtasks.exe 4924 schtasks.exe 4892 schtasks.exe 6656 schtasks.exe 5748 schtasks.exe 6788 schtasks.exe 5476 schtasks.exe 5852 schtasks.exe 3704 schtasks.exe 2088 schtasks.exe 10764 schtasks.exe 8116 schtasks.exe 1352 schtasks.exe 8744 schtasks.exe 7668 schtasks.exe 2812 schtasks.exe 6784 schtasks.exe 9824 schtasks.exe 7268 schtasks.exe 7436 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4920 InstallUtil.exe 10172 freedom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3312 cabal.exe 3180 powershell.exe 3180 powershell.exe 2920 update.exe 2920 update.exe 2920 update.exe 2920 update.exe 2920 update.exe 2212 powershell.exe 2212 powershell.exe 1140 powershell.exe 1140 powershell.exe 4276 powershell.exe 4276 powershell.exe 2280 powershell.exe 2280 powershell.exe 2416 powershell.exe 2416 powershell.exe 644 XClient.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1580 svchost.exe 3648 Explorer.EXE 2940 4363463463464363463463463.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 3176 sysklnorbcv.exe 5296 sysnldcvmr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2940 4363463463464363463463463.exe Token: SeDebugPrivilege 3312 cabal.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeDebugPrivilege 2920 update.exe Token: SeIncreaseQuotaPrivilege 3180 powershell.exe Token: SeSecurityPrivilege 3180 powershell.exe Token: SeTakeOwnershipPrivilege 3180 powershell.exe Token: SeLoadDriverPrivilege 3180 powershell.exe Token: SeSystemProfilePrivilege 3180 powershell.exe Token: SeSystemtimePrivilege 3180 powershell.exe Token: SeProfSingleProcessPrivilege 3180 powershell.exe Token: SeIncBasePriorityPrivilege 3180 powershell.exe Token: SeCreatePagefilePrivilege 3180 powershell.exe Token: SeBackupPrivilege 3180 powershell.exe Token: SeRestorePrivilege 3180 powershell.exe Token: SeShutdownPrivilege 3180 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeSystemEnvironmentPrivilege 3180 powershell.exe Token: SeRemoteShutdownPrivilege 3180 powershell.exe Token: SeUndockPrivilege 3180 powershell.exe Token: SeManageVolumePrivilege 3180 powershell.exe Token: 33 3180 powershell.exe Token: 34 3180 powershell.exe Token: 35 3180 powershell.exe Token: 36 3180 powershell.exe Token: SeIncreaseQuotaPrivilege 3180 powershell.exe Token: SeSecurityPrivilege 3180 powershell.exe Token: SeTakeOwnershipPrivilege 3180 powershell.exe Token: SeLoadDriverPrivilege 3180 powershell.exe Token: SeSystemProfilePrivilege 3180 powershell.exe Token: SeSystemtimePrivilege 3180 powershell.exe Token: SeProfSingleProcessPrivilege 3180 powershell.exe Token: SeIncBasePriorityPrivilege 3180 powershell.exe Token: SeCreatePagefilePrivilege 3180 powershell.exe Token: SeBackupPrivilege 3180 powershell.exe Token: SeRestorePrivilege 3180 powershell.exe Token: SeShutdownPrivilege 3180 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeSystemEnvironmentPrivilege 3180 powershell.exe Token: SeRemoteShutdownPrivilege 3180 powershell.exe Token: SeUndockPrivilege 3180 powershell.exe Token: SeManageVolumePrivilege 3180 powershell.exe Token: 33 3180 powershell.exe Token: 34 3180 powershell.exe Token: 35 3180 powershell.exe Token: 36 3180 powershell.exe Token: SeIncreaseQuotaPrivilege 3180 powershell.exe Token: SeSecurityPrivilege 3180 powershell.exe Token: SeTakeOwnershipPrivilege 3180 powershell.exe Token: SeLoadDriverPrivilege 3180 powershell.exe Token: SeSystemProfilePrivilege 3180 powershell.exe Token: SeSystemtimePrivilege 3180 powershell.exe Token: SeProfSingleProcessPrivilege 3180 powershell.exe Token: SeIncBasePriorityPrivilege 3180 powershell.exe Token: SeCreatePagefilePrivilege 3180 powershell.exe Token: SeBackupPrivilege 3180 powershell.exe Token: SeRestorePrivilege 3180 powershell.exe Token: SeShutdownPrivilege 3180 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeSystemEnvironmentPrivilege 3180 powershell.exe Token: SeRemoteShutdownPrivilege 3180 powershell.exe Token: SeUndockPrivilege 3180 powershell.exe Token: SeManageVolumePrivilege 3180 powershell.exe Token: 33 3180 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2220 java.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 220 msedge.exe 2696 dwm.exe 220 msedge.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2220 java.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe 2696 dwm.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2920 update.exe 2920 update.exe 644 XClient.exe 2220 java.exe 3804 ven_protected.exe 972 Runtime Broker.exe 1672 Runtime Broker.exe 1308 Runtime Broker.exe 772 Runtime Broker.exe 1152 Runtime Broker.exe 4548 Runtime Broker.exe 5976 server.exe 5976 server.exe 4000 Runtime Broker.exe 764 Runtime Broker.exe 8188 Runtime Broker.exe 6608 Runtime Broker.exe 5652 Runtime Broker.exe 5440 Runtime Broker.exe 5580 Runtime Broker.exe 6172 Runtime Broker.exe 7984 Runtime Broker.exe 4520 Runtime Broker.exe 7020 Runtime Broker.exe 10252 Runtime Broker.exe 4920 InstallUtil.exe 8248 Runtime Broker.exe 5168 Runtime Broker.exe 1556 PerfWatson1.exe 8004 Runtime Broker.exe 10172 freedom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3312 2940 4363463463464363463463463.exe 83 PID 2940 wrote to memory of 3312 2940 4363463463464363463463463.exe 83 PID 2940 wrote to memory of 3312 2940 4363463463464363463463463.exe 83 PID 2940 wrote to memory of 4412 2940 4363463463464363463463463.exe 86 PID 2940 wrote to memory of 4412 2940 4363463463464363463463463.exe 86 PID 2940 wrote to memory of 4412 2940 4363463463464363463463463.exe 86 PID 4412 wrote to memory of 3176 4412 5.exe 89 PID 4412 wrote to memory of 3176 4412 5.exe 89 PID 4412 wrote to memory of 3176 4412 5.exe 89 PID 3176 wrote to memory of 2408 3176 sysklnorbcv.exe 91 PID 3176 wrote to memory of 2408 3176 sysklnorbcv.exe 91 PID 3176 wrote to memory of 2408 3176 sysklnorbcv.exe 91 PID 3176 wrote to memory of 720 3176 sysklnorbcv.exe 93 PID 3176 wrote to memory of 720 3176 sysklnorbcv.exe 93 PID 3176 wrote to memory of 720 3176 sysklnorbcv.exe 93 PID 2408 wrote to memory of 3180 2408 cmd.exe 95 PID 2408 wrote to memory of 3180 2408 cmd.exe 95 PID 2408 wrote to memory of 3180 2408 cmd.exe 95 PID 720 wrote to memory of 2212 720 cmd.exe 96 PID 720 wrote to memory of 2212 720 cmd.exe 96 PID 720 wrote to memory of 2212 720 cmd.exe 96 PID 720 wrote to memory of 2280 720 cmd.exe 97 PID 720 wrote to memory of 2280 720 cmd.exe 97 PID 720 wrote to memory of 2280 720 cmd.exe 97 PID 720 wrote to memory of 4008 720 cmd.exe 98 PID 720 wrote to memory of 4008 720 cmd.exe 98 PID 720 wrote to memory of 4008 720 cmd.exe 98 PID 720 wrote to memory of 4160 720 cmd.exe 99 PID 720 wrote to memory of 4160 720 cmd.exe 99 PID 720 wrote to memory of 4160 720 cmd.exe 99 PID 720 wrote to memory of 2628 720 cmd.exe 100 PID 720 wrote to memory of 2628 720 cmd.exe 100 PID 720 wrote to memory of 2628 720 cmd.exe 100 PID 3312 wrote to memory of 2920 3312 cabal.exe 103 PID 3312 wrote to memory of 2920 3312 cabal.exe 103 PID 3312 wrote to memory of 2920 3312 cabal.exe 103 PID 2940 wrote to memory of 3676 2940 4363463463464363463463463.exe 106 PID 2940 wrote to memory of 3676 2940 4363463463464363463463463.exe 106 PID 2940 wrote to memory of 3676 2940 4363463463464363463463463.exe 106 PID 3676 wrote to memory of 4560 3676 11.exe 107 PID 3676 wrote to memory of 4560 3676 11.exe 107 PID 3676 wrote to memory of 4560 3676 11.exe 107 PID 4560 wrote to memory of 884 4560 sysarddrvs.exe 109 PID 4560 wrote to memory of 884 4560 sysarddrvs.exe 109 PID 4560 wrote to memory of 884 4560 sysarddrvs.exe 109 PID 4560 wrote to memory of 1812 4560 sysarddrvs.exe 111 PID 4560 wrote to memory of 1812 4560 sysarddrvs.exe 111 PID 4560 wrote to memory of 1812 4560 sysarddrvs.exe 111 PID 884 wrote to memory of 2212 884 cmd.exe 113 PID 884 wrote to memory of 2212 884 cmd.exe 113 PID 884 wrote to memory of 2212 884 cmd.exe 113 PID 1812 wrote to memory of 2188 1812 cmd.exe 114 PID 1812 wrote to memory of 2188 1812 cmd.exe 114 PID 1812 wrote to memory of 2188 1812 cmd.exe 114 PID 1812 wrote to memory of 1672 1812 cmd.exe 115 PID 1812 wrote to memory of 1672 1812 cmd.exe 115 PID 1812 wrote to memory of 1672 1812 cmd.exe 115 PID 1812 wrote to memory of 3288 1812 cmd.exe 116 PID 1812 wrote to memory of 3288 1812 cmd.exe 116 PID 1812 wrote to memory of 3288 1812 cmd.exe 116 PID 1812 wrote to memory of 2240 1812 cmd.exe 117 PID 1812 wrote to memory of 2240 1812 cmd.exe 117 PID 1812 wrote to memory of 2240 1812 cmd.exe 117 PID 1812 wrote to memory of 2880 1812 cmd.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Files\cabal.exe"C:\Users\Admin\AppData\Local\Temp\Files\cabal.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\Files\update.exe"C:\Users\Admin\AppData\Local\Temp\Files\update.exe" mmoparadox4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\5.exe"C:\Users\Admin\AppData\Local\Temp\Files\5.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\302485988.exeC:\Users\Admin\AppData\Local\Temp\302485988.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:5076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2876
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:1708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1728
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2297530278.exeC:\Users\Admin\AppData\Local\Temp\2297530278.exe5⤵
- Executes dropped EXE
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\3238922919.exeC:\Users\Admin\AppData\Local\Temp\3238922919.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\2256514898.exeC:\Users\Admin\AppData\Local\Temp\2256514898.exe5⤵
- Executes dropped EXE
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\3333212685.exeC:\Users\Admin\AppData\Local\Temp\3333212685.exe5⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\11.exe"C:\Users\Admin\AppData\Local\Temp\Files\11.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:2188
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:1672
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:3288
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\726420428.exeC:\Users\Admin\AppData\Local\Temp\726420428.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:1004
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:5116
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3275911949.exeC:\Users\Admin\AppData\Local\Temp\3275911949.exe5⤵
- Executes dropped EXE
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\93424183.exeC:\Users\Admin\AppData\Local\Temp\93424183.exe5⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3463530481.exeC:\Users\Admin\AppData\Local\Temp\3463530481.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\759028573.exeC:\Users\Admin\AppData\Local\Temp\759028573.exe5⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\2995323471.exeC:\Users\Admin\AppData\Local\Temp\2995323471.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:5760 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe6⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\3347726980.exeC:\Users\Admin\AppData\Local\Temp\3347726980.exe7⤵
- Checks computer location settings
- Executes dropped EXE
PID:6000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:2988
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:3004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:2404
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\106815289.exeC:\Users\Admin\AppData\Local\Temp\106815289.exe7⤵
- Executes dropped EXE
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\17824204.exeC:\Users\Admin\AppData\Local\Temp\17824204.exe7⤵
- Executes dropped EXE
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\2416025277.exeC:\Users\Admin\AppData\Local\Temp\2416025277.exe7⤵
- Executes dropped EXE
PID:2344
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lastest.exe"C:\Users\Admin\AppData\Local\Temp\Files\lastest.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:656 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1580 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ApplicationFrameHost.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4640
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 20445⤵PID:9284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Files\Launcher.exe"3⤵
- Executes dropped EXE
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe"C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe"3⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\networks_profile.exe"C:\Users\Admin\AppData\Local\Temp\Files\networks_profile.exe"3⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Files\networks_profile.exe"C:\Users\Admin\AppData\Local\Temp\Files\networks_profile.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:4292
-
-
C:\Windows\SYSTEM32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7z.exe"C:\Users\Admin\AppData\Local\Temp\Files\7z.exe"3⤵
- Executes dropped EXE
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ffc42a446f8,0x7ffc42a44708,0x7ffc42a447184⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:24⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:34⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:84⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:14⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:14⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:14⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:14⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:14⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:84⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵PID:5404
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x118,0x11c,0xd4,0x114,0x7ff71e0c5460,0x7ff71e0c5470,0x7ff71e0c54805⤵PID:5784
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:84⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:14⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,13278924538067898369,7460274772165579679,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:24⤵PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\service.exe"C:\Users\Admin\AppData\Local\Temp\Files\service.exe"3⤵
- Executes dropped EXE
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dccrypt.exe"C:\Users\Admin\AppData\Local\Temp\Files\dccrypt.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:5880 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\serverperf\Rf9n8rAaQutOZQd6TFDgcQ0Y3BLG9XLXz1nDso2.vbe"4⤵
- Checks computer location settings
PID:5248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\serverperf\gc411KmXHpEBvwsmBcLMcGXH8jhoDdLsi9TAz2QKUXLoYkYDWV2rtqOl.bat" "5⤵PID:2004
-
C:\serverperf\Portwebwin.exe"C:\serverperf/Portwebwin.exe"6⤵
- Executes dropped EXE
PID:3240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cryyy.exe"C:\Users\Admin\AppData\Local\Temp\Files\cryyy.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 13284⤵
- Program crash
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PCSupport.exe"C:\Users\Admin\AppData\Local\Temp\Files\PCSupport.exe"3⤵
- Executes dropped EXE
PID:5128 -
C:\Users\Admin\AppData\Local\PhantomSoft\Support\winvnc.exeC:\Users\Admin\AppData\Local\PhantomSoft\Support\winvnc.exe4⤵
- Executes dropped EXE
PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Vidar.exe"C:\Users\Admin\AppData\Local\Temp\Files\Vidar.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe" & rd /s /q "C:\ProgramData\EHJJECBKKECF" & exit5⤵PID:4816
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:4740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"3⤵
- Executes dropped EXE
PID:5880
-
-
C:\Users\Admin\AppData\Local\Temp\Files\uctgkfb7.exe"C:\Users\Admin\AppData\Local\Temp\Files\uctgkfb7.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:4616 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows" /tr "C:\Users\Admin\Windows.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"3⤵
- Executes dropped EXE
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\199076676.exeC:\Users\Admin\AppData\Local\Temp\199076676.exe4⤵
- Executes dropped EXE
PID:5964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ven_protected.exe"C:\Users\Admin\AppData\Local\Temp\Files\ven_protected.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\Files\41m98slk.exe"C:\Users\Admin\AppData\Local\Temp\Files\41m98slk.exe"3⤵
- Executes dropped EXE
PID:5244 -
C:\Windows\SysWOW64\cmd.execmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value4⤵PID:5504
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value5⤵PID:2468
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\.ses",start4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 4524⤵
- Program crash
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵
- Executes dropped EXE
PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵
- Executes dropped EXE
PID:5680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1472
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uE5J9VOwpiD7.bat" "5⤵PID:5236
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:1756
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5208
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cCwKAlILb5YE.bat" "7⤵PID:5976
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:772
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5816
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"8⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:4080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P54elIApyx88.bat" "9⤵PID:4208
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"10⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dTyBqYgekmxt.bat" "11⤵PID:5328
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2468
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3520
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"12⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U6US1qZt8nRt.bat" "13⤵PID:2952
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:1880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"14⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bPaz7gfpi3f0.bat" "15⤵PID:3720
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:4252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5852
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"16⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:5832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IBagvzpBzBR8.bat" "17⤵PID:1132
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:5656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"18⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:4924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\x2jTimIfMEar.bat" "19⤵PID:6168
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:6340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6472
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"20⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:8188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:8096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g0a0NDuiCLmN.bat" "21⤵PID:7724
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:7576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7436
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"22⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:6608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vpQnmARWIAcW.bat" "23⤵PID:6848
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:6780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6640
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"24⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5652 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:5124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9wynFDOlUCBj.bat" "25⤵PID:1976
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1232
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5220
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"26⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ntLopB9xi2Ek.bat" "27⤵PID:3272
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:5328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"28⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5580 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lnRk3D8rVLGt.bat" "29⤵PID:4780
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:4016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5500
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"30⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:6172 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:8116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TZH76awo3lqG.bat" "31⤵PID:7656
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:7412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7428
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"32⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:7984 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:5884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pafprqId3NAf.bat" "33⤵PID:7880
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:6212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7468
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"34⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4520 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UxTzb8XaVPBD.bat" "35⤵PID:5964
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:6260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"36⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:7020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:4812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xFix6A4oKNt8.bat" "37⤵PID:8592
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:4608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7000
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"38⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:10252 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:6656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZVUWIw7x2WEk.bat" "39⤵PID:11432
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:11388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11356
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"40⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:8248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4itZw8IkpNiX.bat" "41⤵PID:4292
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:10164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10268
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"42⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:6784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IFdInoHftUqa.bat" "43⤵PID:1768
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:7348
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5256
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"44⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:8004 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:10764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp2.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp2.exe"3⤵
- Executes dropped EXE
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"3⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 4804⤵
- Program crash
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"3⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe"C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall4⤵
- Sets service image path in registry
- Executes dropped EXE
PID:6020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"3⤵
- Executes dropped EXE
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MJPVgHw.exe"C:\Users\Admin\AppData\Local\Temp\Files\MJPVgHw.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5984 -
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:5456
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵
- Adds Run key to start application
PID:2732
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵
- Adds Run key to start application
PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3.exe"C:\Users\Admin\AppData\Local\Temp\Files\3.exe"3⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"3⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\Files\5_6190317556063017550.exe"C:\Users\Admin\AppData\Local\Temp\Files\5_6190317556063017550.exe"3⤵
- Checks processor information in registry
PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\Files\InfluencedNervous.exe"C:\Users\Admin\AppData\Local\Temp\Files\InfluencedNervous.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k copy Fail Fail.cmd & Fail.cmd & exit4⤵PID:5832
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3720
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:5396
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5180
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"5⤵PID:4220
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2295365⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ReprintVerificationMercyRepository" Elliott5⤵PID:1144
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Exhibit + Rand + Hours 229536\U5⤵PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\229536\Webster.pif229536\Webster.pif 229536\U5⤵
- Checks computer location settings
- Checks processor information in registry
PID:1320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\229536\Webster.pif" & rd /s /q "C:\ProgramData\EBFBFBFIIJDA" & exit6⤵PID:3824
-
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- Delays execution with timeout.exe
PID:5776
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:2436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"3⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 4764⤵
- Program crash
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\plantrojan.exe"C:\Users\Admin\AppData\Local\Temp\Files\plantrojan.exe"3⤵PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"3⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\server.exe"C:\Users\Admin\AppData\Local\Temp\Files\server.exe"3⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:5976
-
-
C:\Users\Admin\AppData\Local\Temp\Files\343dsxs.exe"C:\Users\Admin\AppData\Local\Temp\Files\343dsxs.exe"3⤵
- Suspicious use of SetThreadContext
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"3⤵PID:3008
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"4⤵PID:4296
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:1224
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\usvcinsta64.exe"4⤵PID:2208
-
C:\Windows\System32\usvcinsta64.exe"C:\Windows\System32\usvcinsta64.exe"5⤵PID:4712
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵PID:6584
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"7⤵
- Command and Scripting Interpreter: PowerShell
PID:440
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"6⤵PID:7556
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"7⤵
- Command and Scripting Interpreter: PowerShell
PID:2432
-
-
-
C:\Windows\System32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:7216
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:7404
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:7092
-
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵
- Loads dropped DLL
PID:8048 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:7932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:7852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
PID:6728
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc create x856732 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x856732\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x856732.dat" /f && sc start x8567328⤵PID:8128
-
C:\Windows\system32\sc.exesc create x856732 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:7580
-
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x856732\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x856732.dat" /f9⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:7548
-
-
C:\Windows\system32\sc.exesc start x8567329⤵
- Launches sc.exe
PID:7720
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:7484
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵
- Loads dropped DLL
PID:7392 -
C:\Windows\System32\cmd.execmd.exe /c schtasks /delete /tn "console_zero" /f10⤵
- Indicator Removal: Clear Persistence
PID:7976 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn "console_zero" /f11⤵PID:7732
-
-
-
C:\Windows\System32\cmd.execmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f10⤵PID:6388
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:4708
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && rmdir /s /q "C:\Windows \"8⤵PID:6524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:1252
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak9⤵
- Delays execution with timeout.exe
PID:6960
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Windows\System32\usvcinsta64.exe"6⤵PID:7960
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:7772
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"4⤵PID:5364
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:6976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\exe003.exe"C:\Users\Admin\AppData\Local\Temp\Files\exe003.exe"3⤵
- Drops file in System32 directory
PID:760 -
C:\Windows\SysWOW64\Kopjhb32.exeC:\Windows\system32\Kopjhb32.exe4⤵
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\SysWOW64\Khhoah32.exeC:\Windows\system32\Khhoah32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3196 -
C:\Windows\SysWOW64\Kobgnbic.exeC:\Windows\system32\Kobgnbic.exe6⤵PID:1176
-
C:\Windows\SysWOW64\Kdopfigj.exeC:\Windows\system32\Kdopfigj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4900 -
C:\Windows\SysWOW64\Kacppmfd.exeC:\Windows\system32\Kacppmfd.exe8⤵PID:3812
-
C:\Windows\SysWOW64\Klhdmf32.exeC:\Windows\system32\Klhdmf32.exe9⤵
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Kaemem32.exeC:\Windows\system32\Kaemem32.exe10⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5792 -
C:\Windows\SysWOW64\Khoebgkn.exeC:\Windows\system32\Khoebgkn.exe11⤵PID:4136
-
C:\Windows\SysWOW64\Koimoa32.exeC:\Windows\system32\Koimoa32.exe12⤵PID:2252
-
C:\Windows\SysWOW64\Kecekkjh.exeC:\Windows\system32\Kecekkjh.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Lbgfdo32.exeC:\Windows\system32\Lbgfdo32.exe14⤵
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Ldhblgop.exeC:\Windows\system32\Ldhblgop.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4392 -
C:\Windows\SysWOW64\Lkbkia32.exeC:\Windows\system32\Lkbkia32.exe16⤵PID:5388
-
C:\Windows\SysWOW64\Lehofj32.exeC:\Windows\system32\Lehofj32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3704 -
C:\Windows\SysWOW64\Lkdgoa32.exeC:\Windows\system32\Lkdgoa32.exe18⤵PID:2832
-
C:\Windows\SysWOW64\Lhhhhecc.exeC:\Windows\system32\Lhhhhecc.exe19⤵
- Modifies registry class
PID:5396 -
C:\Windows\SysWOW64\Lbnlenci.exeC:\Windows\system32\Lbnlenci.exe20⤵PID:2584
-
C:\Windows\SysWOW64\Lelhajbm.exeC:\Windows\system32\Lelhajbm.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\Llfqnc32.exeC:\Windows\system32\Llfqnc32.exe22⤵PID:4252
-
C:\Windows\SysWOW64\Lacifkga.exeC:\Windows\system32\Lacifkga.exe23⤵PID:1488
-
C:\Windows\SysWOW64\Mlimccgg.exeC:\Windows\system32\Mlimccgg.exe24⤵
- Modifies registry class
PID:4208 -
C:\Windows\SysWOW64\Mcbepm32.exeC:\Windows\system32\Mcbepm32.exe25⤵
- Modifies registry class
PID:5188 -
C:\Windows\SysWOW64\Mddbhfdb.exeC:\Windows\system32\Mddbhfdb.exe26⤵PID:60
-
C:\Windows\SysWOW64\Mdfone32.exeC:\Windows\system32\Mdfone32.exe27⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\Mkpgjpjl.exeC:\Windows\system32\Mkpgjpjl.exe28⤵PID:6068
-
C:\Windows\SysWOW64\Mdikce32.exeC:\Windows\system32\Mdikce32.exe29⤵PID:1860
-
C:\Windows\SysWOW64\Mcjlalil.exeC:\Windows\system32\Mcjlalil.exe30⤵PID:2088
-
C:\Windows\SysWOW64\Mdkhidoj.exeC:\Windows\system32\Mdkhidoj.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5604 -
C:\Windows\SysWOW64\Moqlfmnp.exeC:\Windows\system32\Moqlfmnp.exe32⤵PID:4028
-
C:\Windows\SysWOW64\Maohbimd.exeC:\Windows\system32\Maohbimd.exe33⤵
- Drops file in System32 directory
PID:4728 -
C:\Windows\SysWOW64\Nldmpamj.exeC:\Windows\system32\Nldmpamj.exe34⤵PID:2240
-
C:\Windows\SysWOW64\Naaehhka.exeC:\Windows\system32\Naaehhka.exe35⤵
- Drops file in System32 directory
PID:5928 -
C:\Windows\SysWOW64\Nhkndbcn.exeC:\Windows\system32\Nhkndbcn.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1632 -
C:\Windows\SysWOW64\Ncqaakbd.exeC:\Windows\system32\Ncqaakbd.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3720 -
C:\Windows\SysWOW64\Ndbnic32.exeC:\Windows\system32\Ndbnic32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Nogbgl32.exeC:\Windows\system32\Nogbgl32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\Nknclm32.exeC:\Windows\system32\Nknclm32.exe40⤵PID:5996
-
C:\Windows\SysWOW64\Nfdgif32.exeC:\Windows\system32\Nfdgif32.exe41⤵
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Nkqpam32.exeC:\Windows\system32\Nkqpam32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\Nchhbj32.exeC:\Windows\system32\Nchhbj32.exe43⤵
- Drops file in System32 directory
PID:656 -
C:\Windows\SysWOW64\Odidjbbj.exeC:\Windows\system32\Odidjbbj.exe44⤵PID:1308
-
C:\Windows\SysWOW64\Ooohgk32.exeC:\Windows\system32\Ooohgk32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3576 -
C:\Windows\SysWOW64\Obmecg32.exeC:\Windows\system32\Obmecg32.exe46⤵PID:4796
-
C:\Windows\SysWOW64\Olbiqp32.exeC:\Windows\system32\Olbiqp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\Oclamjhf.exeC:\Windows\system32\Oclamjhf.exe48⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3440 -
C:\Windows\SysWOW64\Obanofmo.exeC:\Windows\system32\Obanofmo.exe49⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1220 -
C:\Windows\SysWOW64\Ofpgdd32.exeC:\Windows\system32\Ofpgdd32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4004 -
C:\Windows\SysWOW64\Pmllgn32.exeC:\Windows\system32\Pmllgn32.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\Pbidoe32.exeC:\Windows\system32\Pbidoe32.exe52⤵
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Pmnhmn32.exeC:\Windows\system32\Pmnhmn32.exe53⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\Pieiao32.exeC:\Windows\system32\Pieiao32.exe54⤵PID:4476
-
C:\Windows\SysWOW64\Pkfbcj32.exeC:\Windows\system32\Pkfbcj32.exe55⤵PID:3712
-
C:\Windows\SysWOW64\Pijbmnhk.exeC:\Windows\system32\Pijbmnhk.exe56⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\Qeqcao32.exeC:\Windows\system32\Qeqcao32.exe57⤵
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Qmjhhlmo.exeC:\Windows\system32\Qmjhhlmo.exe58⤵
- Drops file in System32 directory
- Modifies registry class
PID:640 -
C:\Windows\SysWOW64\Aeemmojj.exeC:\Windows\system32\Aeemmojj.exe59⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4288 -
C:\Windows\SysWOW64\Aloeii32.exeC:\Windows\system32\Aloeii32.exe60⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Abimfcid.exeC:\Windows\system32\Abimfcid.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3828 -
C:\Windows\SysWOW64\Aicecm32.exeC:\Windows\system32\Aicecm32.exe62⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5440 -
C:\Windows\SysWOW64\Afgflaoj.exeC:\Windows\system32\Afgflaoj.exe63⤵PID:4816
-
C:\Windows\SysWOW64\Amanik32.exeC:\Windows\system32\Amanik32.exe64⤵PID:5300
-
C:\Windows\SysWOW64\Abngab32.exeC:\Windows\system32\Abngab32.exe65⤵PID:1704
-
C:\Windows\SysWOW64\Aihonllk.exeC:\Windows\system32\Aihonllk.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5568 -
C:\Windows\SysWOW64\Apagkfch.exeC:\Windows\system32\Apagkfch.exe67⤵PID:3972
-
C:\Windows\SysWOW64\Aeopcmbp.exeC:\Windows\system32\Aeopcmbp.exe68⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\Amehdkbb.exeC:\Windows\system32\Amehdkbb.exe69⤵
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Windows\SysWOW64\Bcppqe32.exeC:\Windows\system32\Bcppqe32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Bealhmpm.exeC:\Windows\system32\Bealhmpm.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4048 -
C:\Windows\SysWOW64\Bpfqff32.exeC:\Windows\system32\Bpfqff32.exe72⤵PID:1820
-
C:\Windows\SysWOW64\Bfpibpgp.exeC:\Windows\system32\Bfpibpgp.exe73⤵PID:5220
-
C:\Windows\SysWOW64\Blmakgeg.exeC:\Windows\system32\Blmakgeg.exe74⤵
- Drops file in System32 directory
PID:5944 -
C:\Windows\SysWOW64\Bbgiga32.exeC:\Windows\system32\Bbgiga32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\Bmmndj32.exeC:\Windows\system32\Bmmndj32.exe76⤵
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\Bcgfad32.exeC:\Windows\system32\Bcgfad32.exe77⤵PID:1036
-
C:\Windows\SysWOW64\Bfebno32.exeC:\Windows\system32\Bfebno32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4220 -
C:\Windows\SysWOW64\Bmojjijg.exeC:\Windows\system32\Bmojjijg.exe79⤵
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\Bdicgc32.exeC:\Windows\system32\Bdicgc32.exe80⤵
- Drops file in System32 directory
PID:5772 -
C:\Windows\SysWOW64\Bejoolhb.exeC:\Windows\system32\Bejoolhb.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4432 -
C:\Windows\SysWOW64\Cppcldgh.exeC:\Windows\system32\Cppcldgh.exe82⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4924 -
C:\Windows\SysWOW64\Cfjliooe.exeC:\Windows\system32\Cfjliooe.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4448 -
C:\Windows\SysWOW64\Cdnlbcno.exeC:\Windows\system32\Cdnlbcno.exe84⤵PID:4264
-
C:\Windows\SysWOW64\Cijdjjlf.exeC:\Windows\system32\Cijdjjlf.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Cliafekj.exeC:\Windows\system32\Cliafekj.exe86⤵
- Drops file in System32 directory
PID:5652 -
C:\Windows\SysWOW64\Cdpigbll.exeC:\Windows\system32\Cdpigbll.exe87⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Cmhmqhbl.exeC:\Windows\system32\Cmhmqhbl.exe88⤵PID:1696
-
C:\Windows\SysWOW64\Cdbemb32.exeC:\Windows\system32\Cdbemb32.exe89⤵
- System Location Discovery: System Language Discovery
PID:5712 -
C:\Windows\SysWOW64\Cfqbin32.exeC:\Windows\system32\Cfqbin32.exe90⤵PID:5096
-
C:\Windows\SysWOW64\Cmkjfhpj.exeC:\Windows\system32\Cmkjfhpj.exe91⤵
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\Cpifbcom.exeC:\Windows\system32\Cpifbcom.exe92⤵
- Modifies registry class
PID:6148 -
C:\Windows\SysWOW64\Cbgbnona.exeC:\Windows\system32\Cbgbnona.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6204 -
C:\Windows\SysWOW64\Dlpggdea.exeC:\Windows\system32\Dlpggdea.exe94⤵PID:6248
-
C:\Windows\SysWOW64\Dbjodn32.exeC:\Windows\system32\Dbjodn32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
PID:6288 -
C:\Windows\SysWOW64\Didgqhdk.exeC:\Windows\system32\Didgqhdk.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6348 -
C:\Windows\SysWOW64\Dlbcmdco.exeC:\Windows\system32\Dlbcmdco.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6392 -
C:\Windows\SysWOW64\Ddilnaca.exeC:\Windows\system32\Ddilnaca.exe98⤵PID:6420
-
C:\Windows\SysWOW64\Dekhei32.exeC:\Windows\system32\Dekhei32.exe99⤵
- Modifies registry class
PID:6460 -
C:\Windows\SysWOW64\Difdfhbi.exeC:\Windows\system32\Difdfhbi.exe100⤵PID:6500
-
C:\Windows\SysWOW64\Ddlhca32.exeC:\Windows\system32\Ddlhca32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:6564 -
C:\Windows\SysWOW64\Dgjdpl32.exeC:\Windows\system32\Dgjdpl32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6592 -
C:\Windows\SysWOW64\Dihalh32.exeC:\Windows\system32\Dihalh32.exe103⤵
- Modifies registry class
PID:6636 -
C:\Windows\SysWOW64\Dlgmhc32.exeC:\Windows\system32\Dlgmhc32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6672 -
C:\Windows\SysWOW64\Diknag32.exeC:\Windows\system32\Diknag32.exe105⤵PID:6712
-
C:\Windows\SysWOW64\Dlijmcmg.exeC:\Windows\system32\Dlijmcmg.exe106⤵PID:6744
-
C:\Windows\SysWOW64\Dgonklmm.exeC:\Windows\system32\Dgonklmm.exe107⤵PID:6780
-
C:\Windows\SysWOW64\Ellfcbkd.exeC:\Windows\system32\Ellfcbkd.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6816 -
C:\Windows\SysWOW64\Eceopm32.exeC:\Windows\system32\Eceopm32.exe109⤵PID:6844
-
C:\Windows\SysWOW64\Emkcme32.exeC:\Windows\system32\Emkcme32.exe110⤵
- System Location Discovery: System Language Discovery
PID:6880 -
C:\Windows\SysWOW64\Epioiaak.exeC:\Windows\system32\Epioiaak.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:6912 -
C:\Windows\SysWOW64\Echkelpo.exeC:\Windows\system32\Echkelpo.exe112⤵
- Drops file in System32 directory
PID:6948 -
C:\Windows\SysWOW64\Emnpbepd.exeC:\Windows\system32\Emnpbepd.exe113⤵PID:6984
-
C:\Windows\SysWOW64\Eplloqoh.exeC:\Windows\system32\Eplloqoh.exe114⤵PID:7016
-
C:\Windows\SysWOW64\Ecjhklnl.exeC:\Windows\system32\Ecjhklnl.exe115⤵
- Drops file in System32 directory
PID:7052 -
C:\Windows\SysWOW64\Eeidggmp.exeC:\Windows\system32\Eeidggmp.exe116⤵
- Modifies registry class
PID:7084 -
C:\Windows\SysWOW64\Enplhenb.exeC:\Windows\system32\Enplhenb.exe117⤵
- Modifies registry class
PID:7120 -
C:\Windows\SysWOW64\Edjddoeo.exeC:\Windows\system32\Edjddoeo.exe118⤵PID:7152
-
C:\Windows\SysWOW64\Eekalg32.exeC:\Windows\system32\Eekalg32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Eleiiabj.exeC:\Windows\system32\Eleiiabj.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1852 -
C:\Windows\SysWOW64\Egjnfjbp.exeC:\Windows\system32\Egjnfjbp.exe121⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6184 -
C:\Windows\SysWOW64\Fndfcd32.exeC:\Windows\system32\Fndfcd32.exe122⤵PID:6260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-