Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
Resource
win10v2004-20241007-en
General
-
Target
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
-
Size
15.8MB
-
MD5
db5818c5d7a25382f53f6f961b5d04f5
-
SHA1
fe5f8cfd8adf3297a2dd883951ed84af9058721d
-
SHA256
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9
-
SHA512
1b1e3b124dba5666b3e04942b8306836b608fc639664538b70f937b4af6f0473a7d9c9e0fc6565eabc2c24e2d139171c9c227f9c648d464b8c0c346b4f899a21
-
SSDEEP
393216:SpNtz8jMP3N9X4VPpiFPXyK3q3kwaQNnMykEOSc:S3Z3P3N9X24Xlq3xBMz
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET6F27.tmp DrvInst.exe File created C:\Windows\system32\DRIVERS\SET6F27.tmp DrvInst.exe File opened for modification C:\Windows\system32\DRIVERS\tap0901.sys DrvInst.exe -
Modifies Windows Firewall 2 TTPs 5 IoCs
pid Process 2740 netsh.exe 2724 netsh.exe 2648 netsh.exe 1416 netsh.exe 864 netsh.exe -
Executes dropped EXE 12 IoCs
pid Process 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2676 xIdr.exe 2624 xIdr.tmp 2696 XkcY.exe 2996 xIdr.exe 2732 xIdr.tmp 1800 tapinstall.exe 1732 tapinstall.exe 2468 tapinstall.exe 832 LetsPRO.exe 2236 LetsPRO.exe -
Loads dropped DLL 64 IoCs
pid Process 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2664 cmd.exe 2676 xIdr.exe 3044 cmd.exe 2624 xIdr.tmp 2624 xIdr.tmp 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2240 cmd.exe 2996 xIdr.exe 2732 xIdr.tmp 2732 xIdr.tmp 2732 xIdr.tmp 2732 xIdr.tmp 2028 regsvr32.exe 2492 regsvr32.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 2696 XkcY.exe 832 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\LetsPRO = "\"C:\\Program Files (x86)\\letsvpn\\app-3.11.2\\LetsPRO.exe\" /silent" LetsPRO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2240 ARP.EXE 2024 cmd.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3351.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3350.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3350.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstor.dat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3352.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3352.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File created C:\Windows\System32\DriverStore\INFCACHE.0 DrvInst.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\SET3351.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\letsvpn\app-3.11.2\it\System.Web.Services.Description.resources.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Diagnostics.Debug.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Globalization.Extensions.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.FileSystem.AccessControl.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Linq.Parallel.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Windows.Interactivity.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\log4net.config XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\FontAwesome.WPF.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Diagnostics.Tools.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\arm64 XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Hardcodet.Wpf.TaskbarNotification.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Xml.XmlDocument.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\es\System.Web.Services.Description.resources.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\Update.exe XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe.config XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Mono.Cecil.Pdb.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\SharpCompress.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Dynamic.Runtime.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Threading.AccessControl.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\zh-MO XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\SQLitePCLRaw.provider.dynamic_cdecl.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\zh-TW\LetsPRO.resources.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Diagnostics.StackTrace.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\pl XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.ServiceProcess.ServiceController.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.AppCenter.Crashes.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Collections.Concurrent.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Diagnostics.EventLog.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Diagnostics.TextWriterTraceListener.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Drawing.Primitives.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Linq.Parallel.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.ComponentModel.Primitives.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Data.SqlClient.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.FileSystem.Watcher.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.MemoryMappedFiles.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.ServiceModel.Security.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\es XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.Pipes.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Runtime.InteropServices.RuntimeInformation.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Cryptography.Primitives.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Permissions.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\WpfAnimatedGif.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\runtimes\win-x64\native XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\ICSharpCode.AvalonEdit.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.CodeDom.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.NetworkInformation.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.AccessControl.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\runtimes XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Squirrel.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Principal.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.ServiceModel.Security.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Text.Encoding.Extensions.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Text.RegularExpressions.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\de XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.WebSockets.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\x86 XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Cryptography.Csp.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Threading.Tasks.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\ko\System.Web.Services.Description.resources.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\zh-CN XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\zh-Hant\System.Web.Services.Description.resources.dll XkcY.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Win32.Registry.AccessControl.dll XkcY.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Dynamic.Runtime.dll XkcY.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File created C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\oem2.inf DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.app.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev2 DrvInst.exe -
pid Process 1952 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xIdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xIdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xIdr.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xIdr.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XkcY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2848 timeout.exe 2552 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2796 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@netcfgx.dll,-50003 = "Allows other computers to access resources on your computer using a Microsoft network." DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\rascfg.dll,-32010 = "Provides the abilitiy to connect a host to a Remote Access Concentrator that supports RFC2516." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@netcfgx.dll,-50002 = "Allows your computer to access resources on a Microsoft network." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tcpipcfg.dll,-50001 = "Transmission Control Protocol/Internet Protocol. The default wide area network protocol that provides communication across diverse interconnected networks." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@tcpipcfg.dll,-50002 = "TCP/IP version 6. The latest version of the internet protocol that provides communication across diverse interconnected networks." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2 LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\DefaultIcon LetsPRO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\DefaultIcon\ = "\"C:\\Program Files (x86)\\letsvpn\\app-3.11.2\\LetsPRO.exe\",1" LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\shell\open LetsPRO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\shell\open\command\ = "\"C:\\Program Files (x86)\\letsvpn\\app-3.11.2\\LetsPRO.exe\" \"%1\"" LetsPRO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\ = "letsvpn2Protocol" LetsPRO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\URL Protocol = "C:\\Program Files (x86)\\letsvpn\\app-3.11.2\\LetsPRO.exe" LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\shell\open\command LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\letsvpn2\shell LetsPRO.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 LetsPRO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 LetsPRO.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\CA\Certificates\329B78A5C9EBC2043242DE90CE1B7C6B1BA6C692 LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\CA\Certificates\329B78A5C9EBC2043242DE90CE1B7C6B1BA6C692\Blob = 030000000100000014000000329b78a5c9ebc2043242de90ce1b7c6b1ba6c6921900000001000000100000000e8c3d8a006eb5c23a7725464ad10a8c0400000001000000100000002aa320982e00193fad3bd0ea5406e4cd0f0000000100000030000000a229d2722bc6091d73b1d979b81088c977cb028a6f7cbf264bb81d5cc8f099f87d7c296e48bf09d7ebe275f5498661a414000000010000001400000032eb929aff3596482f284042702036915c1785e61800000001000000100000002aa1c05e2ae606f198c2c5e937c97aa24b0000000100000044000000420032004600410046003700360039003200460044003900460046004200440036003400450044004500330031003700450034003200330033003400420041005f0000002000000001000000730500003082056f30820457a003020102021048fc93b46055948d36a7c98a89d69416300d06092a864886f70d01010c0500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3231303532353030303030305a170d3238313233313233353935395a3056310b300906035504061302474231183016060355040a130f5365637469676f204c696d69746564312d302b060355040313245365637469676f205075626c696320436f6465205369676e696e6720526f6f742052343630820222300d06092a864886f70d01010105000382020f003082020a02820201008de79412220424742eff162302928ab6ae3685ac47d423912b3edc7de231a0516fac8491e3528ab5e296ded0876324898affef12933b7dbbb68abdbd057f279b6b65d3a50c69b1bc49399af16d6eaae4a08327da9a0d2b50e94b5bb3b86436a47e4a3da971ab61b373b33c0b0cefdb3357e5be3437e3971b5dfd1f123d820376e6fb3f66d2943169fa6db334acc17a78dc9250f264c7aa2d04abc36aeae02fa7a7dc6ed7e8ffda21ab40bfb9ee0d9ec6d99e99efc6de1fa90c76b32720a1d6bafd80e701d2efeb822995708dffbb15cffed10f36a22e4f329074466b4735137705334f632eb82de1bf65a7046b18d871facc08f26d899910b1addb3e2ce4aa18b0c607017567de6de963631e367f6989beaa453e6e5a5f8fa15bcb9d308630e803b340c60d0f38cd67a85388fab83065fa6fc7e71db18374693eacc4683bb1e667339ab608e080054840eef6826446a8f573b00695f26c659fbf555b1c9c571ac778467c70aa941b8217ac87e9b6c90e811c40d6161729fc5c9c182bea45f5efbdd5674f285e05ee904c7ae7c6f4d0fcfacd3e32461320368a04eab7aa07469c0d933a096699585c29a3b90ca630383cd04636357c9cbaeec3d5f90a76fa7e051b40ca9235e9d57ad1b57f00aea990aac57f019c10b116fccc6e18dc6f62fea650a7b87bb89d153ffe200c75c8225a1395199000e91ad5c286f1e38eec5ff4e50203010001a38201123082010e301f0603551d23041830168014a0110a233e96f107ece2af29ef82a57fd030a4b4301d0603551d0e0416041432eb929aff3596482f284042702036915c1785e6300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff30130603551d25040c300a06082b06010505070303301b0603551d200414301230060604551d20003008060667810c01040130430603551d1f043c303a3038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c303406082b0601050507010104283026302406082b060105050730018618687474703a2f2f6f6373702e636f6d6f646f63612e636f6d300d06092a864886f70d01010c0500038201010012bfa1ef8b749a9844b86946b5ab240a0ca48a67b83a81bf458a7d5207a88d1f4e218539a36b5e2d2086bf10b8ae793b53cdb4fbd844be06d95c6367d44016874486722ad63215f51283c2f9e15d114067f6422772c523e202381a4c20e2db01f7cd464f26a27c66c05136b6890254c7fc58fb6c00eefe98a62e95a10c53291f6fd819a64f9ef7ac09ea5d82c68baf80a7bd8148528431da32ec15e4a64c3d6c3973d40b853920e0851a68e1a74838a9d1362577c18d1916c5884c667d2f63ce98e869dfac3ca85d9dc91c5baed8f32f74cfb87ef6d7839d1196629aae4513da7fdc47fbdfc3529fe60655e99d8cf23a6251bcec240f29d4588084e4457b5ad8 LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 1952 powershell.exe 2732 xIdr.tmp 2732 xIdr.tmp 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 1952 powershell.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeRestorePrivilege 2992 rundll32.exe Token: SeBackupPrivilege 2848 vssvc.exe Token: SeRestorePrivilege 2848 vssvc.exe Token: SeAuditPrivilege 2848 vssvc.exe Token: SeBackupPrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 2180 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1700 DrvInst.exe Token: SeLoadDriverPrivilege 1700 DrvInst.exe Token: SeLoadDriverPrivilege 1700 DrvInst.exe Token: SeLoadDriverPrivilege 1700 DrvInst.exe Token: SeRestorePrivilege 1732 tapinstall.exe Token: SeLoadDriverPrivilege 1732 tapinstall.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeRestorePrivilege 1972 DrvInst.exe Token: SeLoadDriverPrivilege 1972 DrvInst.exe Token: SeDebugPrivilege 2236 LetsPRO.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 2732 xIdr.tmp 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe 2236 LetsPRO.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 1672 wrote to memory of 484 1672 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 31 PID 484 wrote to memory of 2816 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 32 PID 484 wrote to memory of 2816 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 32 PID 484 wrote to memory of 2816 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 32 PID 484 wrote to memory of 2816 484 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 32 PID 2816 wrote to memory of 2552 2816 cmd.exe 34 PID 2816 wrote to memory of 2552 2816 cmd.exe 34 PID 2816 wrote to memory of 2552 2816 cmd.exe 34 PID 2816 wrote to memory of 2552 2816 cmd.exe 34 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2816 wrote to memory of 2776 2816 cmd.exe 35 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2776 wrote to memory of 2840 2776 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe 36 PID 2840 wrote to memory of 2664 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 37 PID 2840 wrote to memory of 2664 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 37 PID 2840 wrote to memory of 2664 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 37 PID 2840 wrote to memory of 2664 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 37 PID 2840 wrote to memory of 3044 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 39 PID 2840 wrote to memory of 3044 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 39 PID 2840 wrote to memory of 3044 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 39 PID 2840 wrote to memory of 3044 2840 7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp 39 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2664 wrote to memory of 2676 2664 cmd.exe 41 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 2676 wrote to memory of 2624 2676 xIdr.exe 42 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 3044 wrote to memory of 2696 3044 cmd.exe 43 PID 2624 wrote to memory of 2240 2624 xIdr.tmp 44 PID 2624 wrote to memory of 2240 2624 xIdr.tmp 44 PID 2624 wrote to memory of 2240 2624 xIdr.tmp 44 PID 2624 wrote to memory of 2240 2624 xIdr.tmp 44 PID 2696 wrote to memory of 1952 2696 XkcY.exe 47 PID 2696 wrote to memory of 1952 2696 XkcY.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp"C:\Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$40016,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\timeout.exetimeout /T 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\is-UEUKF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp"C:\Users\Admin\AppData\Local\Temp\is-UEUKF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$401B6,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\xIdr.exe6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Public\Documents\xIdr.exeC:\Users\Public\Documents\xIdr.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\is-RBPCK.tmp\xIdr.tmp"C:\Users\Admin\AppData\Local\Temp\is-RBPCK.tmp\xIdr.tmp" /SL5="$401EA,450511,141312,C:\Users\Public\Documents\xIdr.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES9⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\timeout.exetimeout /T 310⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2848
-
-
C:\Users\Public\Documents\xIdr.exe"C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\is-4TE3M.tmp\xIdr.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TE3M.tmp\xIdr.tmp" /SL5="$40162,450511,141312,C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2732 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\system32\regsvr32.exe/s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll13⤵
- Loads dropped DLL
PID:2492
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\XkcY.exe6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Public\Documents\XkcY.exeC:\Users\Public\Documents\XkcY.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"8⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09018⤵
- Executes dropped EXE
PID:1800
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap09018⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets8⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets.exe8⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets.exe9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe8⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO.exe9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO8⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsVPN8⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsVPN9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1416
-
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09018⤵
- Executes dropped EXE
PID:2468
-
-
C:\Program Files (x86)\letsvpn\LetsPRO.exe"C:\Program Files (x86)\letsvpn\LetsPRO.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:832 -
C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ipconfig /all10⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all11⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C netsh interface ipv4 set interface LetsTAP metric=110⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\netsh.exenetsh interface ipv4 set interface LetsTAP metric=111⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C route print10⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\ROUTE.EXEroute print11⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no10⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C arp -a10⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\ARP.EXEarp -a11⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{734e8506-952a-50f1-ebbf-420a991e3133}\oemvista.inf" "9" "6d14a44ff" "000000000000049C" "WinSta0\Default" "00000000000003A4" "208" "c:\program files (x86)\letsvpn\driver"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{714e07f1-39c2-6420-0e9a-156b1df3567a} Global\{31b1b15d-9797-1ae1-a4c4-681f28c3405a} C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\tap0901.cat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003DC" "00000000000003C0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:tap0901.NTamd64:tap0901.ndi:9.24.6.601:tap0901" "6d14a44ff" "000000000000049C" "00000000000005D8" "00000000000005E8"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD526009f092ba352c1a64322268b47e0e3
SHA1e1b2220cd8dcaef6f7411a527705bd90a5922099
SHA256150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9
SHA512c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363
-
Filesize
99KB
MD51e3cf83b17891aee98c3e30012f0b034
SHA1824f299e8efd95beca7dd531a1067bfd5f03b646
SHA2569f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f
SHA512fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3aa4367eb540422637ee99aef91296
SHA1fca332adddeb31b1abb93d9bdbbf956a9765480e
SHA256ac6bb859893baad2a3c4ea03975cbf61d838eb42f4dbd3f0c0253884b82ff57c
SHA512b9c060dae7ecf45b57ccbc7ba414288a13cdb0a73fc63fea452fd0ee2d39b98b85b16ace02159b559bb9bccc3d24299596951c678d3f7d4f536b15d3acba2d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39d336c3ad22975be11294af439512d
SHA1f1345c824c8721e7e5a4dc56362ae428653f4025
SHA256ce05fde84989bada20a27a3563e1a78b23faa1c25f1edc6392e8fb813fe4f8d8
SHA5126d52243edd1e7bb5d6fae0def24fa91b42d0fbcaf82bfe37da2d16b4c932156a41b99d29b988ffbf0633a8536b546da0ac1eb488c5d0363d5661dbd8811d68c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545878297bfdab9d5d21433dbb91fa632
SHA10860963fbde6fdac213233b9abaf32aeb50b575e
SHA25692dc95daf42ea72247ae53725bc66ecafb99a8b0089c4daffe238e4d07c2c0da
SHA512951606e1fd3868259f0f5d68092b2fb477bc5463cf85cf3738e58533365e0752c2daaa9ed78ee436f3b2ed9615bdd7f9dc46385ba7e8b1bb53b2e19dd611288c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea632892603c191571ca326e535d5be4
SHA1e3727d8212ca4481778d46c14624d04555af219f
SHA25614b6adf040fc64b368559ffa75ff29ad587420fe62021f7a68b376247b7ca391
SHA5129706cab8ec82c4a04820de64bb5a5d31e6ee41092950452430a277af1f476b8b664c243283b12f5b5e670d819ecdf5476458f5f2bc6ba041c0075178d7582ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504fee1fe88a532e1c3d7f0f320aa47b8
SHA10aaf1b99f75f3777dbf2214755aabf6275cc2bef
SHA256050cba6f61d4e7016696146b85d74cf75e83985c212b5920336669475fb1159c
SHA51268fa6019901340e5bca1fa52f2988dba986aca818aa81238d0b5bbf372a01d81c314db0821686cb77786dfb240ee783d2acb487e6acc740901c2f93cc893e8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51460dee9070d05fedc1c380cc54c0cfa
SHA1458af3246aab0e17ba3a3013cb18a00ddada5c8a
SHA2565d12f639b5cd8dd37ba6b77fc3aaf02823d610424a4f7bbffff839cf4d820899
SHA5128e90ae3ab99a8a36e65e537719f2b2d601fed3160fcd7a27ff73e743ab4a31099f9d91f855ccf2ee5b704738aa356bc6298fbaa1a96a19c1d444434fe1b0d21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc0fe861e08d09ade304dccad4c7f01
SHA11de6b99dc6ff5d741b6a73f1f83203409eaa0d79
SHA25668e7116fbb0810a04ace293ebdef423dc81075603abf5027dccef43f48323801
SHA5124610eae3470fc7c5f768eec5b22c6a392e18858c1b4cae14d2dfb949a93a4d7449cc37bf7d47ac01aa7e2e046bd683bc16b5370a6dbf39c47d4175acf838cb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad7178dc49630a115002e6ac8349ba6
SHA167bf5ee8a07fd858d80e629a948584ffe6da9bf1
SHA25661a330e60fa680b4a3ba4d02b885f046ca95b80dc23dd91a9e8c9c062d3f06f7
SHA512bed0926f6e8eaa64118e7067c01f9f841779e42f4aca1fca63693a19e286e8e81a2fea58506745f2b914aa1936b56f51eca000dd5ebbc129ea7aa3fc14d98cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9879b43c8c6f3a221f8dee9e698a5c8
SHA109b874d298411034ecc81e948bdf1f7d5128182f
SHA25614b5615e8c7ae0e969b2915145ae5eca209c8221e12bcb8f1172e4def62edd3f
SHA51214a7df3fc2e606825de95e1ca1f6c2a05547e07721a924ad2e71e5a2fda589fe269b90f8d0b4ee1a92b0ab514c1d6a5bd80287ebeb74248241886643f794bb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759b1c135d62eb5f8af994d962b87d9b
SHA1c9465d0b7b7b113bd6320b84b751498e45912eec
SHA256e129e23311e176a606b22b246787be3a6216021cdbf7301c2b09076290d723f4
SHA512b24c0188d03540a88af4f2a0a75d36a2644ef6ab8fc12b9eaf442ac459a260d5964ebe52f3de4e7637be687fea69f2e2441126f9788de9c09f77130a72046b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD527eefd76583132d943f8efcc411b3cd4
SHA1164542b1cc2a2238c05a34731a18c7588ee9ee18
SHA2569d4ea927620e47648742683c727d4392b29a2522a1136a38267d0c7e6380bb77
SHA512462114a87d6d56db376c6f952317d0185969b25eef305ca7e0ccd932075738ad1e2c040e6f39320072e0795eb2e561c6e95c9c4cf0031c9cb1cbe0f6b4ad91cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
51KB
MD57f8e1969b0874c8fb9ab44fc36575380
SHA13057c9ce90a23d29f7d0854472f9f44e87b0f09a
SHA256076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd
SHA5127aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555
-
Filesize
3KB
MD529c0f406102b94c5d38e25c9943d9985
SHA1f9073df4cadcc70e896becfccbbc159fccc8196a
SHA256911c6c2c49838dc11f9d10512e9df1d60483b78ca6a164987a2f572be4b8f732
SHA5128413f042bdff6dc16c18e498ac7168b6efb318721eba720a6c2bd6cabae421439dc27e9e06d37d57ccb8c699a08f13e909bd9fbc20fa3230954cbc577737b709
-
Filesize
1.1MB
MD52c8dc574be7d1f780d42a2a9b8360c66
SHA1fbae754f9ff7ea7caa528900f186cc6e49ef1609
SHA25626db8da9a1921abec961ed77d4713389901a3cfe97dd420283bb679c5b537b2d
SHA512a33c66e7729dc913d5089e2569f7b7e649bf6b11895bbccc88c95666c6e18e0ce09a66ef57434f3470014166bb2c6e1f5e1de2d830722642078c8db335e34495
-
Filesize
722KB
MD58227e4c7968f31debf26e01c5b3373ea
SHA1da4a3634918d45a3c076dece82534425914763ea
SHA256c180b6566c67983b6b065010f2ee50a594e532777cbb509ffaebec037d6dfa18
SHA5124b03e9b40b4720208359b93ef350f1dbd56b368938c9673f035f7f5e76ff622d4eafdcf6205907ef0855d27debd063e82f51f448a2b2c1a8d548b3455d539332
-
Filesize
14.7MB
MD5e039e221b48fc7c02517d127e158b89f
SHA179eed88061472ae590616556f31576ca13bfc7fb
SHA256dc30e5dab15392627d30a506f6304030c581fc00716703fc31add10ff263d70b
SHA51287231c025bb94771e89a639c9cb1528763f096059f8806227b8ab45a8f1ea5cd3d94fdc91cb20dd140b91a14904653517f7b6673a142a864a58a2726d14ae4b8
-
Filesize
810KB
MD5293b0b9d1f227d92c2d7eec2f24ad24d
SHA165ba68759577ba15279e3934a50ca2e1fa31797f
SHA256f30e5bbafa334ed502d1db1085a0033e74649b7ed1d3caaf719e4e0d80513498
SHA512e08c30e52faf5cce75e3095b5dc805f083e330b71d7a03af4d6b365877aeded6ac827a53232d82e25e809b991ec7a2f17fd3d3367d747936cfcb57cb8540475f
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF
Filesize8KB
MD52147c28db2b267f312c89b0a6a71e037
SHA1a0cd14bcf1e7d07372f297aa7a5c1fd15296aae3
SHA25685147e629a379822a85ba3c3877284bb92335271365cae8e919436e1efd47b3f
SHA512f35e3a80b11cbc7330894b0d17f04593487a3fb72df8463f26f2a92fe7454837b1d3f5f9cb59016cc618801d17a3614d37346abe33e3551bfe4424e505c23b6d
-
Filesize
1.4MB
MD5f376c949b09e2a2afe5368104e6d0751
SHA1ad705348227b4eb2d514b66fc7eda1a962b613a0
SHA256f2a52d4ab3330cb90579dd3e6fd5d3a86de3326f1820ac83c164671926c06e28
SHA512174db21dae1258d06cf4fbcbd4c69406d4548dbe92600e42c0c89b3dace06fff8e7b9aca890d78537eb64eca6c38ac10cb629825fe7daff1c2a6f8d4d4fe9f99
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
8KB
MD5c7f9fa536ee6239aef93a6f130effb78
SHA1031bdc2bac5bbd97c02fc865c4717430c72e15c4
SHA256feb2374060b716b99cc68df0fad211992b440a79c3aa4a3cd24f2e5a063c80f7
SHA5121af79157b73a4205ad000aa0ca28e51b18c48c336ff8a8065c9bec2bcacb250e3f1376f68a60a417b2f68dc9cfe6b84c5af005dc9413986d6a9fb03b67320a38
-
Filesize
30KB
MD5b1c405ed0434695d6fc893c0ae94770c
SHA179ecacd11a5f2b7e2d3f0461eef97b7b91181c46
SHA2564c474ea37a98899e2997591a5e963f10f7d89d620c74c8ee099d3490f5213246
SHA512635421879cd4c7c069489033afaf7db1641615bfd84e237264acfe3f2d67668ecfe8a9b9edd0e9d35b44dec7d6ba0197ed7048dfb8ec3dba87ccdc88be9acfb7
-
Filesize
9KB
MD54fee2548578cd9f1719f84d2cb456dbf
SHA13070ed53d0e9c965bf1ffea82c259567a51f5d5f
SHA256baecd78253fb6fbcfb521131e3570bf655aa9a05bb5610ce8bb4bddccf599b24
SHA5126bc0c8c3757d1e226218a9485a4f9cdbae7ca40b56c35b9ff28c373be9bd6fbd7b1846ddf5680edb2e910d31912791afe2f9f2207b3880b56adb55426fc3fd49
-
Filesize
240KB
MD5bd8643e5db648810348aa0755e455b70
SHA1119cb1fb3057d9759d0abb3dfdafc460456c1cc4
SHA256bec6a116ea2224dd1532c6eaf20e4d61199240e55ccd0270199fbd22f2806477
SHA512b8033d8989c66431e1771ffc6d2549a4d1e32b8612b7331e7a2931ddad3e31c8a7e1af8ef129883034b1fcf466b8ad0e1cab431cbf5c20c724f4eef53468f714
-
Filesize
1.1MB
MD58fdc58c7d4c59472615682d6dea9d190
SHA18e131fe09fd238493719b4fd92e6c833bf3596c1
SHA25626a5be637ee680b1ec11d1adf2fd0972cc52078cbd200d9273f8bb826707c83b
SHA512b05b9fd8ff3d627b562cbd2968466fb54adbc2fa5591ebe803300a3c5ef7887bc1761d8013b47aab0f5387265c8b7b15078a01abb75d4c3180671780181ebe24
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp
Filesize1.1MB
MD5070f66d3e84cd5ecccbb772fcf8e7811
SHA1bc9c66bbe77da53a8d57ad9e41fd92936e892937
SHA256b61184c727ecfeed0d77a237872ba282a544e15cfc54c28f420f06a5abea55db
SHA512aa0803ae82c115b28e5965b1c3387580b833330db03fe69778d1f5680948bb5369d48336ed2e016a279ddfd239a39ea17922e66a017858f128d9f4aa4a9bbdcf
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
9KB
MD5b7d61f3f56abf7b7ff0d4e7da3ad783d
SHA115ab5219c0e77fd9652bc62ff390b8e6846c8e3e
SHA25689a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912
SHA5126467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a