Resubmissions
03-02-2025 03:04
250203-dkkqjszkhq 1003-02-2025 02:21
250203-cs7plsylfr 1003-02-2025 02:20
250203-csf7nawqbz 1002-02-2025 21:21
250202-z7mdjsylhx 302-02-2025 18:40
250202-xbfvsawpaq 1002-02-2025 18:19
250202-wyncpstlfw 1024-01-2025 01:23
250124-br1z1asnhz 1024-01-2025 00:12
250124-ag75wssjak 1028-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 10Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-02-2025 02:21
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20241007-en
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.0.1:4782
interestingsigma.hopto.org:20
193.161.193.99:20466
testinghigger-42471.portmap.host:42471
89f58ee5-7af9-42de-843f-2a331a641e3f
-
encryption_key
CD4F349DEB46AEE10C2FE886E5B2BD7A766723CE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
darkcomet
BROUTEUR
voltazur.ddns.net:1604
DC_MUTEX-CLRHTUN
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
cVxQXF1dUQRM
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
MicroUpdate
Extracted
lumma
https://scriptyprefej.store/api
https://navygenerayk.store/api
https://founpiuer.store/api
https://necklacedmny.store/api
https://thumbystriw.store/api
https://fadehairucw.store/api
https://crisiwarny.store/api
https://presticitpo.store/api
https://servicedny.site/api
https://authorisev.site/api
https://faulteyotk.site/api
https://dilemmadu.site/api
https://contemteny.site/api
https://goalyfeastz.site/api
https://opposezmny.site/api
https://seallysl.site/api
https://ponintnykqwm.shop/api
Extracted
asyncrat
0.5.8
Default
192.168.0.14:4343
18.ip.gl.ply.gg:6606
18.ip.gl.ply.gg:7707
18.ip.gl.ply.gg:8808
18.ip.gl.ply.gg:9028
38.240.58.195:6606
6.tcp.eu.ngrok.io:12925
a1OON3Evw1pM
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
2464c7bf-a165-4397-85fe-def5290750b0
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Extracted
quasar
1.4.0.0
FakeCreal
espinyskibidi-40205.portmap.host:40205
CdrjrrWbtRopP1ic7E
-
encryption_key
HXEHSwyN1GHqlZUqunrd
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client
-
subdirectory
Microsoft
Extracted
xworm
127.0.0.1:6000
103.211.201.109:6000
127.0.0.1:48990
147.185.221.22:48990
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M
Extracted
quasar
1.3.0.0
Office04
217.195.197.192:1604
iG5Qu7mo7JWZRWS2JY
-
encryption_key
f8ffk4jC3Ygnfr2GgGiB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
gurcu
https://api.telegram.org/bot7617703274:AAFEXxgPRP1fZGT5UCjcRV4hUZdtNFxyusQ/sendMessage?chat_id=-4568449403
http://209.38.221.184:8080
http://46.235.26.83:8080
http://147.28.185.29:80
http://206.166.251.4:8080
http://51.159.4.50:8080
http://167.235.70.96:8080
http://194.164.198.113:8080
http://132.145.17.167:9090
https://5.196.181.135:443
http://116.202.101.219:8080
https://185.217.98.121:443
http://185.217.98.121:8080
http://159.203.174.113:8090
http://107.161.20.142:8080
https://192.99.196.191:443
http://65.49.205.24:8080
https://154.9.207.142:443
http://67.230.176.97:8080
http://8.222.143.111:8080
http://8.219.110.16:9999
http://41.87.207.180:9090
http://38.207.174.88:8080
http://185.217.98.121:80
http://18.228.80.130:80
http://168.138.211.88:8099
http://129.151.109.160:8080
http://20.78.55.47:8080
http://8.216.92.21:8080
https://138.2.92.67:443
http://38.60.191.38:80
http://101.126.19.171:80
http://47.96.78.224:8080
http://101.43.160.136:8080
Extracted
redline
testx
193.203.238.86:1912
Extracted
quasar
1.4.1
sigorta
18.198.25.148:1604
af7e773d-541a-46fd-87d3-06bb0a26aab9
-
encryption_key
D306945220105109C86E6E257D749CE885E76091
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
hacked-fud1
192.168.100.10:1412
a685d3ed-d174-40b7-9655-c2bfab3ed130
-
encryption_key
2A5F3DAC380078962166175BD172DE2D4AA07E26
-
install_name
fud2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Extracted
quasar
1.4.0
Target
127.0.0.1:6070
affasdqa.ddns.net:6070
haffasdqa.duckdns.org:6070
670d21b7-71ed-4958-9ba7-a58fa54d8203
-
encryption_key
25B2622CE0635F9A273AB61B1B7D7B94220AC509
-
install_name
svhoste.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhoste
-
subdirectory
SubDir
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:8080
127.0.0.1:18274
6.tcp.eu.ngrok.io:6606
6.tcp.eu.ngrok.io:7707
6.tcp.eu.ngrok.io:8808
6.tcp.eu.ngrok.io:8080
6.tcp.eu.ngrok.io:18274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
gurcu
https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M/sendMessage?chat_id=-4538387273
Signatures
-
Asyncrat family
-
Darkcomet family
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/files/0x000e00000002b5f9-15316.dat family_umbral -
Detect Xworm Payload 9 IoCs
resource yara_rule behavioral1/files/0x001e00000002aea7-3689.dat family_xworm behavioral1/memory/2684-3693-0x0000000000300000-0x000000000031A000-memory.dmp family_xworm behavioral1/files/0x001e00000002ad27-5526.dat family_xworm behavioral1/memory/6800-5533-0x00000000009E0000-0x00000000009F6000-memory.dmp family_xworm behavioral1/files/0x001f00000002aedd-6527.dat family_xworm behavioral1/memory/4968-6532-0x00000000004C0000-0x0000000000548000-memory.dmp family_xworm behavioral1/files/0x001800000002b162-7590.dat family_xworm behavioral1/files/0x001400000002b3de-9647.dat family_xworm behavioral1/files/0x001200000002b547-14518.dat family_xworm -
Gurcu family
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Lumma family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Dark_Brout_ncrypt.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe -
Nanocore family
-
Njrat family
-
description flow ioc Process 1286 ip-api.com Process not Found 2886 ip-api.com Process not Found 271 ip-api.com Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe 481 ip-api.com Process not Found 2489 ip-api.com Process not Found 734 ip-api.com Process not Found 1447 ip-api.com Process not Found 2163 ip-api.com Process not Found 1748 ip-api.com Process not Found 1953 ip-api.com Process not Found 2339 ip-api.com Process not Found 1614 ip-api.com Process not Found 3103 ip-api.com Process not Found 634 ip-api.com Process not Found 1061 ip-api.com Process not Found 1170 ip-api.com Process not Found -
Quasar family
-
Quasar payload 39 IoCs
resource yara_rule behavioral1/files/0x0003000000000689-932.dat family_quasar behavioral1/memory/3832-939-0x0000000000E70000-0x0000000001194000-memory.dmp family_quasar behavioral1/files/0x000b000000000699-1457.dat family_quasar behavioral1/memory/6624-1462-0x0000000000830000-0x0000000000B54000-memory.dmp family_quasar behavioral1/files/0x002b00000002ad28-3432.dat family_quasar behavioral1/memory/1880-3436-0x00000000007D0000-0x0000000000AF4000-memory.dmp family_quasar behavioral1/files/0x001d00000002aea1-3457.dat family_quasar behavioral1/memory/3168-3461-0x0000000000170000-0x00000000001BE000-memory.dmp family_quasar behavioral1/files/0x002100000002aec6-3927.dat family_quasar behavioral1/memory/2604-3931-0x0000000000200000-0x000000000025E000-memory.dmp family_quasar behavioral1/files/0x001700000002a483-4851.dat family_quasar behavioral1/memory/5584-4857-0x00000000008D0000-0x0000000000BF4000-memory.dmp family_quasar behavioral1/files/0x001900000002b054-5559.dat family_quasar behavioral1/memory/6220-5564-0x0000000000DA0000-0x00000000010C4000-memory.dmp family_quasar behavioral1/files/0x001a00000002b0fa-6366.dat family_quasar behavioral1/memory/2564-6386-0x0000000000A10000-0x0000000000D34000-memory.dmp family_quasar behavioral1/files/0x0002000000025078-7078.dat family_quasar behavioral1/memory/8768-7082-0x0000000000C30000-0x0000000000F54000-memory.dmp family_quasar behavioral1/files/0x001900000002b077-7135.dat family_quasar behavioral1/memory/6324-7139-0x00000000008C0000-0x0000000000BE4000-memory.dmp family_quasar behavioral1/files/0x0003000000025088-7197.dat family_quasar behavioral1/memory/2064-7202-0x0000000000870000-0x0000000000B94000-memory.dmp family_quasar behavioral1/files/0x001700000002b13b-7231.dat family_quasar behavioral1/memory/6096-7365-0x0000000000A50000-0x0000000000D74000-memory.dmp family_quasar behavioral1/files/0x001900000002b144-7483.dat family_quasar behavioral1/memory/5536-7488-0x00000000001C0000-0x0000000000244000-memory.dmp family_quasar behavioral1/files/0x001900000002b16a-7817.dat family_quasar behavioral1/files/0x001800000002b16e-7827.dat family_quasar behavioral1/files/0x001c00000002ab12-8213.dat family_quasar behavioral1/files/0x001e00000002aa32-8940.dat family_quasar behavioral1/files/0x001700000002b241-9531.dat family_quasar behavioral1/files/0x001100000002b43d-9558.dat family_quasar behavioral1/files/0x000f00000002b53a-10194.dat family_quasar behavioral1/files/0x001500000002b4c5-10766.dat family_quasar behavioral1/files/0x001900000002b171-10865.dat family_quasar behavioral1/files/0x001200000002b552-11561.dat family_quasar behavioral1/files/0x001000000002b556-19412.dat family_quasar behavioral1/files/0x001400000002b54b-27104.dat family_quasar behavioral1/files/0x0009000000025142-34198.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x001a00000002af46-5719.dat family_redline behavioral1/memory/5336-5745-0x0000000000B40000-0x0000000000B92000-memory.dmp family_redline behavioral1/files/0x001100000002b491-9704.dat family_redline -
Redline family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Umbral family
-
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe -
Xworm family
-
Async RAT payload 10 IoCs
resource yara_rule behavioral1/files/0x002400000002ae3d-3175.dat family_asyncrat behavioral1/files/0x002200000002ae52-3367.dat family_asyncrat behavioral1/files/0x001e00000002aea9-3768.dat family_asyncrat behavioral1/files/0x001800000002b109-6901.dat family_asyncrat behavioral1/files/0x001800000002b15b-7562.dat family_asyncrat behavioral1/files/0x001800000002b161-7577.dat family_asyncrat behavioral1/files/0x001800000002b183-8337.dat family_asyncrat behavioral1/files/0x00050000000250c1-9308.dat family_asyncrat behavioral1/files/0x001100000002b5e7-14125.dat family_asyncrat behavioral1/files/0x001200000002b5e8-14534.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ wudi.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 970 4028 Client.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1628 powershell.exe 7220 Process not Found 7536 Process not Found 7672 powershell.exe 6036 powershell.exe 5448 Process not Found 5396 Process not Found 3172 powershell.exe 4588 Process not Found 1180 Process not Found 4520 Process not Found 8864 powershell.exe 8892 Process not Found 2724 Process not Found 4028 Process not Found 8572 Process not Found 9520 Process not Found 9520 Process not Found 3128 powershell.exe 1780 Process not Found 8572 Process not Found 3872 Process not Found -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 64 IoCs
flow pid Process 104 1860 4363463463464363463463463.exe 96 1860 4363463463464363463463463.exe 470 1860 4363463463464363463463463.exe 262 1860 4363463463464363463463463.exe 697 7356 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 511 1860 4363463463464363463463463.exe 477 1860 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 604 7356 4363463463464363463463463.exe 334 1860 4363463463464363463463463.exe 625 1860 4363463463464363463463463.exe 735 5348 4363463463464363463463463.exe 621 5348 4363463463464363463463463.exe 699 1860 4363463463464363463463463.exe 374 1860 4363463463464363463463463.exe 421 1860 4363463463464363463463463.exe 789 1860 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe 595 5348 4363463463464363463463463.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS procexp64.exe File created C:\Windows\system32\Drivers\PROCEXP152.SYS procexp64.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe procexp64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "\"C:\\PROGRAM FILES\\SYSINTERNALS\\PROCEXP64.EXE\"" procexp64.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe procexp64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "\"C:\\PROGRAM FILES\\SYSINTERNALS\\PROCEXP64.EXE\"" procexp64.exe -
Modifies Windows Firewall 2 TTPs 64 IoCs
pid Process 2144 netsh.exe 7416 netsh.exe 6492 netsh.exe 7748 netsh.exe 5884 netsh.exe 8076 netsh.exe 5904 netsh.exe 3136 netsh.exe 3128 netsh.exe 5560 netsh.exe 5536 netsh.exe 5496 netsh.exe 7212 netsh.exe 5864 netsh.exe 7380 netsh.exe 5292 Process not Found 1264 netsh.exe 4520 Process not Found 1408 Process not Found 3856 Process not Found 8924 Process not Found 2952 Process not Found 5716 netsh.exe 8848 Process not Found 6620 netsh.exe 11344 Process not Found 9176 Process not Found 8056 netsh.exe 7440 netsh.exe 8624 netsh.exe 1688 Process not Found 5104 Process not Found 14532 Process not Found 4528 netsh.exe 4756 netsh.exe 1944 netsh.exe 8264 Process not Found 4960 netsh.exe 6208 Process not Found 2764 netsh.exe 4508 netsh.exe 8916 Process not Found 1368 Process not Found 17012 Process not Found 6844 netsh.exe 1428 netsh.exe 3360 Process not Found 5796 netsh.exe 7748 netsh.exe 4000 netsh.exe 1228 Process not Found 8000 netsh.exe 4060 netsh.exe 2944 netsh.exe 4024 netsh.exe 4968 netsh.exe 8952 netsh.exe 11324 Process not Found 2340 netsh.exe 248 netsh.exe 6264 Process not Found 8844 Process not Found 1880 netsh.exe 4556 netsh.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 1436 Process not Found 5820 Process not Found 7632 Process not Found 6796 Process not Found -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4832 attrib.exe 7084 attrib.exe 4080 attrib.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" procexp64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" procexp64.exe -
Uses browser remote debugging 2 TTPs 18 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2712 chrome.exe 5688 chrome.exe 228 msedge.exe 4548 chrome.exe 7348 msedge.exe 6936 chrome.exe 4316 msedge.exe 2376 msedge.exe 5524 chrome.exe 6780 chrome.exe 7216 msedge.exe 7200 msedge.exe 7792 chrome.exe 5672 msedge.exe 7840 msedge.exe 7832 msedge.exe 5956 chrome.exe 7336 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x001f00000002aedd-6527.dat net_reactor behavioral1/memory/4968-6532-0x00000000004C0000-0x0000000000548000-memory.dmp net_reactor -
Drops startup file 55 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\09a96e8bdcc22f9e796248ee9591454a.exe system.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\09a96e8bdcc22f9e796248ee9591454a.exe system.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk heo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\65449e22560e51e0740c2a10dc6c9c59.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe attrib.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5fb3d6ac2e5ec4068fb3d8086a910d93.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\65449e22560e51e0740c2a10dc6c9c59.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Bloxflip Predictor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Bloxflip%20Predictor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4aa40237a7fcd4c64b196f4bf74d29c3.exe govno__dlya_jertwy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4aa40237a7fcd4c64b196f4bf74d29c3.exe govno__dlya_jertwy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Bloxflip%20Predictor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Bloxflip%20Predictor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Bloxflip%20Predictor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f1131a682275158f890d0e173fc26677Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5fb3d6ac2e5ec4068fb3d8086a910d93.exe server.exe -
Executes dropped EXE 64 IoCs
pid Process 3832 Client-built.exe 5160 govno__dlya_jertwy.exe 5568 Client-built.exe 2692 Client-built.exe 3076 Debug.exe 5996 Client-built.exe 2556 Client-built.exe 5760 Client-built.exe 6108 Client-built.exe 3544 Client-built.exe 5652 Client-built.exe 4160 Client-built.exe 5328 Client-built.exe 4168 Client-built.exe 6112 Client-built.exe 5364 Client-built.exe 1732 Client-built.exe 5040 Client-built.exe 6340 Client-built.exe 6284 Client-built.exe 6624 runtimebroker.exe 5228 Bloxflip%20Predictor.exe 4636 Client.exe 4540 Bloxflip%20Predictor.exe 6836 Client-built.exe 7032 Bloxflip Predictor.exe 7132 Client.exe 1588 Client-built.exe 6288 Client.exe 6932 enai2.exe 5476 Prototype-tcp.exe 1864 main1.exe 5876 main1.exe 7076 Client-built.exe 7804 Client.exe 5232 Client-built.exe 6260 Client.exe 8144 Client-built.exe 6236 Client.exe 7712 Client-built.exe 6916 Client.exe 6400 smell-the-roses.exe 7240 Client-built.exe 7464 Client.exe 2508 Client-built.exe 7204 Client.exe 1828 Client-built.exe 2872 up.exe 4648 Client.exe 1328 Client-built.exe 1948 Client.exe 568 Client-built.exe 7800 Client.exe 5412 Client-built.exe 7328 Client.exe 3400 Client-built.exe 7940 Client.exe 5644 Client-built.exe 752 Client.exe 7064 Client-built.exe 7124 Client.exe 7552 updater.exe 7676 Client-built.exe 7692 Client.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Wine wudi.exe -
Loads dropped DLL 64 IoCs
pid Process 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 5876 main1.exe 6400 smell-the-roses.exe 6400 smell-the-roses.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe 3152 main1.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1436 Process not Found 5820 Process not Found 7632 Process not Found 6796 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral1/files/0x002e00000002ae31-2904.dat vmprotect behavioral1/memory/5776-2909-0x00007FF637B40000-0x00007FF6380E7000-memory.dmp vmprotect -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AGP Manager = "C:\\Program Files (x86)\\AGP Manager\\agpmgr.exe" Nan_Autre_ncrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\65449e22560e51e0740c2a10dc6c9c59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\5fb3d6ac2e5ec4068fb3d8086a910d93 = "\"C:\\Users\\Admin\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Windows\\Bloxflip Predictor.exe" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Bloxflip%20Predictor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Dark_Brout_ncrypt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\09a96e8bdcc22f9e796248ee9591454a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe\" .." system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\09a96e8bdcc22f9e796248ee9591454a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe\" .." system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\65449e22560e51e0740c2a10dc6c9c59 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5fb3d6ac2e5ec4068fb3d8086a910d93 = "\"C:\\Users\\Admin\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\4aa40237a7fcd4c64b196f4bf74d29c3 = "\"C:\\Users\\Admin\\Desktop\\fun\\Files\\govno__dlya_jertwy.exe\" .." govno__dlya_jertwy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4aa40237a7fcd4c64b196f4bf74d29c3 = "\"C:\\Users\\Admin\\Desktop\\fun\\Files\\govno__dlya_jertwy.exe\" .." govno__dlya_jertwy.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Nan_Autre_ncrypt.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: procexp64.exe File opened (read-only) \??\S: procexp64.exe File opened (read-only) \??\Z: procexp64.exe File opened (read-only) \??\K: procexp64.exe File opened (read-only) \??\W: procexp64.exe File opened (read-only) \??\P: procexp64.exe File opened (read-only) \??\Q: procexp64.exe File opened (read-only) \??\V: procexp64.exe File opened (read-only) \??\H: procexp64.exe File opened (read-only) \??\I: procexp64.exe File opened (read-only) \??\M: procexp64.exe File opened (read-only) \??\U: procexp64.exe File opened (read-only) \??\X: procexp64.exe File opened (read-only) \??\G: procexp64.exe File opened (read-only) \??\B: procexp64.exe File opened (read-only) \??\E: procexp64.exe File opened (read-only) \??\K: procexp64.exe File opened (read-only) \??\M: procexp64.exe File opened (read-only) \??\U: procexp64.exe File opened (read-only) \??\X: procexp64.exe File opened (read-only) \??\B: procexp64.exe File opened (read-only) \??\O: procexp64.exe File opened (read-only) \??\Q: procexp64.exe File opened (read-only) \??\R: procexp64.exe File opened (read-only) \??\e: cmd.exe File opened (read-only) \??\H: procexp64.exe File opened (read-only) \??\J: procexp64.exe File opened (read-only) \??\O: procexp64.exe File opened (read-only) \??\R: procexp64.exe File opened (read-only) \??\T: procexp64.exe File opened (read-only) \??\W: procexp64.exe File opened (read-only) \??\F: procexp64.exe File opened (read-only) \??\A: procexp64.exe File opened (read-only) \??\A: procexp64.exe File opened (read-only) \??\S: procexp64.exe File opened (read-only) \??\V: procexp64.exe File opened (read-only) \??\G: procexp64.exe File opened (read-only) \??\I: procexp64.exe File opened (read-only) \??\N: procexp64.exe File opened (read-only) \??\E: procexp64.exe File opened (read-only) \??\P: procexp64.exe File opened (read-only) \??\L: procexp64.exe File opened (read-only) \??\N: procexp64.exe File opened (read-only) \??\Z: procexp64.exe File opened (read-only) \??\Y: procexp64.exe File opened (read-only) \??\J: procexp64.exe File opened (read-only) \??\T: procexp64.exe File opened (read-only) \??\Y: procexp64.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 1922 pastebin.com 2372 pastebin.com 2536 raw.githubusercontent.com 2612 pastebin.com 2622 pastebin.com 2236 pastebin.com 2087 pastebin.com 2800 pastebin.com 2904 pastebin.com 3095 0.tcp.eu.ngrok.io 1930 pastebin.com 2136 pastebin.com 2177 pastebin.com 2420 pastebin.com 3023 discord.com 3327 pastebin.com 2301 pastebin.com 2492 pastebin.com 3091 pastebin.com 1866 pastebin.com 2111 pastebin.com 2223 pastebin.com 271 6.tcp.eu.ngrok.io 2437 pastebin.com 1873 pastebin.com 1898 pastebin.com 2333 pastebin.com 2535 raw.githubusercontent.com 3286 pastebin.com 2489 0.tcp.in.ngrok.io 2517 pastebin.com 2533 raw.githubusercontent.com 2703 pastebin.com 1751 pastebin.com 1757 pastebin.com 1854 pastebin.com 2032 pastebin.com 2538 pastebin.com 1686 pastebin.com 2675 pastebin.com 2794 pastebin.com 3013 pastebin.com 3028 pastebin.com 5 raw.githubusercontent.com 2847 pastebin.com 3235 pastebin.com 604 raw.githubusercontent.com 1487 bitbucket.org 3128 pastebin.com 2244 pastebin.com 2478 discord.com 2249 pastebin.com 2310 pastebin.com 2347 pastebin.com 2403 raw.githubusercontent.com 3034 6.tcp.eu.ngrok.io 3253 pastebin.com 1656 pastebin.com 2256 pastebin.com 2766 0.tcp.eu.ngrok.io 2925 pastebin.com 2373 discord.com 2543 pastebin.com 155 6.tcp.eu.ngrok.io -
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1061 ip-api.com 2163 ip-api.com 3103 ip-api.com 1286 ip-api.com 1614 ip-api.com 1953 ip-api.com 2489 ip-api.com 1447 ip-api.com 1748 ip-api.com 2339 ip-api.com 271 ip-api.com 481 ip-api.com 634 ip-api.com 734 ip-api.com 1170 ip-api.com 2886 ip-api.com -
flow pid Process 36 3308 firefox.exe -
Drops autorun.inf file 1 TTPs 7 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf svchost.exe File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf svchost.exe File created D:\autorun.inf svchost.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File created C:\Windows\SysWOW64\Dock.exe server.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 6704 Process not Found 7264 Process not Found -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2624 ktyhpldea.exe 5432 wudi.exe 1804 khtoawdltrha.exe 1804 khtoawdltrha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 6036 set thread context of 6924 6036 msdcsc.exe 632 -
resource yara_rule behavioral1/files/0x002a00000002ae98-7718.dat upx behavioral1/files/0x002200000002abb6-18909.dat upx behavioral1/files/0x001000000002b5fe-20653.dat upx behavioral1/files/0x000d00000002b60f-22925.dat upx behavioral1/files/0x000e00000002b60b-25003.dat upx -
Drops file in Program Files directory 23 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\AGP Manager\agpmgr.exe Nan_Autre_ncrypt.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File created C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File created C:\Program Files (x86)\AGP Manager\agpmgr.exe Nan_Autre_ncrypt.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\flowers\smell-the-roses.htm smell-the-roses.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\flowers\smell-the-roses.jpg smell-the-roses.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe File opened for modification C:\Program Files (x86)\Dock.exe server.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Bloxflip Predictor.exe Bloxflip%20Predictor.exe File opened for modification C:\Windows\Bloxflip Predictor.exe attrib.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1084 mshta.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ae67-1654.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 4716 4528 WerFault.exe 1320 10708 9028 Process not Found 2390 8712 10540 Process not Found 2502 14952 10472 Process not Found 2862 10408 13148 Process not Found 2949 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bloxflip Predictor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClientGK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Creal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fern_wifi_recon%252.34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smell-the-roses.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bloxflip%20Predictor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktyhpldea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enai2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rektupp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6328 PING.EXE 8180 Process not Found 8012 Process not Found 6992 Process not Found 8660 Process not Found 4032 PING.EXE 2744 PING.EXE 11552 Process not Found 4660 PING.EXE 6472 PING.EXE 6368 PING.EXE 9796 Process not Found 13392 Process not Found 3628 PING.EXE 6352 PING.EXE 1420 Process not Found 6188 PING.EXE 6972 PING.EXE 8864 Process not Found 5428 Process not Found 7784 Process not Found 11096 Process not Found 7444 PING.EXE 7972 PING.EXE 6668 PING.EXE 7996 Process not Found 6028 PING.EXE 5408 PING.EXE 7160 Process not Found 10940 Process not Found 6760 PING.EXE 6356 Process not Found 1944 Process not Found 5912 PING.EXE 8156 Process not Found 5952 Process not Found 5820 Process not Found 10172 Process not Found 10680 Process not Found 1452 PING.EXE 7324 PING.EXE 8860 Process not Found 9628 Process not Found 7184 PING.EXE 7900 PING.EXE 7112 Process not Found 8544 Process not Found 1700 Process not Found 9516 Process not Found 7496 Process not Found 13704 Process not Found 3440 PING.EXE 2576 Process not Found 11044 Process not Found 2752 PING.EXE 9824 Process not Found 7248 PING.EXE 4872 Process not Found 7448 Process not Found 6948 Process not Found 1548 Process not Found 3040 Process not Found 11928 Process not Found 11420 Process not Found -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 6888 cmd.exe 8464 netsh.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x001c00000002aeed-4643.dat nsis_installer_1 behavioral1/files/0x001c00000002aeed-4643.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 27 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc procexp64.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Control procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters procexp64.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Control procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf procexp64.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags procexp64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters procexp64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf procexp64.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Checks processor information in registry 2 TTPs 41 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier procexp64.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet procexp64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier procexp64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \Registry\Machine\Hardware\Description\System\CentralProcessor procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz procexp64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 2264 Process not Found 8872 Process not Found 6504 Process not Found 7016 Process not Found 12636 Process not Found 4376 timeout.exe 6356 timeout.exe -
Enumerates system info in registry 2 TTPs 27 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 14 IoCs
pid Process 5964 taskkill.exe 644 taskkill.exe 15236 Process not Found 14284 Process not Found 4556 Process not Found 7236 taskkill.exe 6928 taskkill.exe 2836 Process not Found 8784 Process not Found 13988 Process not Found 4604 taskkill.exe 13300 Process not Found 12884 Process not Found 12384 Process not Found -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3870231897-2573482396-1083937135-1000\{ABA38805-7F01-454A-BD4B-5EA266BE7384} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3870231897-2573482396-1083937135-1000\{408D7388-E008-49C7-9E91-E138F53FE867} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 6352 Process not Found 3680 Process not Found 11460 Process not Found 11496 Process not Found 7628 Process not Found 6180 Process not Found -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\SysinternalsSuite.zip:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 4776 Process not Found 5372 Process not Found 9096 Process not Found 8296 Process not Found -
Runs net.exe
-
Runs ping.exe 1 TTPs 64 IoCs
pid Process 5312 PING.EXE 9128 Process not Found 11420 Process not Found 5540 Process not Found 8012 Process not Found 5820 Process not Found 17172 Process not Found 1416 PING.EXE 8864 Process not Found 10940 Process not Found 5692 PING.EXE 5824 Process not Found 9320 Process not Found 1700 Process not Found 6028 PING.EXE 1548 Process not Found 9796 Process not Found 11212 Process not Found 11500 Process not Found 17300 Process not Found 4548 PING.EXE 7252 PING.EXE 1452 PING.EXE 5912 PING.EXE 5952 Process not Found 6652 Process not Found 13136 Process not Found 6328 PING.EXE 2744 PING.EXE 7592 Process not Found 7776 Process not Found 7368 Process not Found 7684 PING.EXE 3968 PING.EXE 7140 PING.EXE 7920 PING.EXE 7784 Process not Found 9504 Process not Found 3604 PING.EXE 1416 PING.EXE 7160 Process not Found 8236 Process not Found 5548 Process not Found 8916 Process not Found 4988 PING.EXE 3152 PING.EXE 2500 PING.EXE 3716 PING.EXE 2808 Process not Found 11044 Process not Found 10840 Process not Found 4372 PING.EXE 2724 PING.EXE 4368 PING.EXE 5576 Process not Found 10052 Process not Found 6444 Process not Found 7896 PING.EXE 3916 PING.EXE 960 PING.EXE 5044 PING.EXE 3740 PING.EXE 5520 PING.EXE 9472 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6612 schtasks.exe 5608 schtasks.exe 8028 schtasks.exe 6452 Process not Found 4592 schtasks.exe 7840 schtasks.exe 6888 schtasks.exe 3968 Process not Found 1928 Process not Found 5876 schtasks.exe 10856 Process not Found 3976 Process not Found 10088 Process not Found 10560 Process not Found 8284 Process not Found 7684 Process not Found 12556 Process not Found 6040 Process not Found 544 schtasks.exe 5332 Process not Found 6120 Process not Found 13280 Process not Found 13228 Process not Found 6624 schtasks.exe 7136 Process not Found 9972 Process not Found 5388 Process not Found 3020 schtasks.exe 13556 Process not Found 11256 Process not Found 4704 schtasks.exe 5204 schtasks.exe 956 Process not Found 4360 Process not Found 6196 schtasks.exe 8280 Process not Found 9668 Process not Found 11832 Process not Found 7924 schtasks.exe 1008 schtasks.exe 5516 schtasks.exe 8816 schtasks.exe 12364 Process not Found 4028 Process not Found 9104 Process not Found 8872 schtasks.exe 6320 Process not Found 7764 Process not Found 8428 Process not Found 2036 Process not Found 5416 Process not Found 3836 Process not Found 1780 Process not Found 6488 Process not Found 12836 Process not Found 5656 Process not Found 5668 Process not Found 1868 Process not Found 6420 Process not Found 11196 Process not Found 2752 Process not Found 8080 Process not Found 928 schtasks.exe 4904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 5536 msedge.exe 5536 msedge.exe 1836 procexp64.exe 5304 msedge.exe 5304 msedge.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe 5804 procexp64.exe -
Suspicious behavior: GetForegroundWindowSpam 9 IoCs
pid Process 5160 govno__dlya_jertwy.exe 6924 iexplore.exe 6304 svchost.exe 5924 server.exe 4976 Nan_Autre_ncrypt.exe 6652 server.exe 7252 server.exe 6328 server.exe 8048 server.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 1836 procexp64.exe 5804 procexp64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 34 IoCs
pid Process 5304 msedge.exe 5304 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 3308 firefox.exe Token: SeDebugPrivilege 1836 procexp64.exe Token: SeBackupPrivilege 1836 procexp64.exe Token: SeSecurityPrivilege 1836 procexp64.exe Token: SeLoadDriverPrivilege 1836 procexp64.exe Token: SeShutdownPrivilege 1836 procexp64.exe Token: SeCreatePagefilePrivilege 1836 procexp64.exe Token: SeShutdownPrivilege 1836 procexp64.exe Token: SeCreatePagefilePrivilege 1836 procexp64.exe Token: SeDebugPrivilege 1836 procexp64.exe Token: SeImpersonatePrivilege 1836 procexp64.exe Token: SeSecurityPrivilege 1836 procexp64.exe Token: SeDebugPrivilege 1836 procexp64.exe Token: SeBackupPrivilege 1836 procexp64.exe Token: SeRestorePrivilege 1836 procexp64.exe Token: SeDebugPrivilege 1836 procexp64.exe Token: SeDebugPrivilege 5804 procexp64.exe Token: SeBackupPrivilege 5804 procexp64.exe Token: SeSecurityPrivilege 5804 procexp64.exe Token: SeLoadDriverPrivilege 5804 procexp64.exe Token: SeShutdownPrivilege 5804 procexp64.exe Token: SeCreatePagefilePrivilege 5804 procexp64.exe Token: SeShutdownPrivilege 5804 procexp64.exe Token: SeCreatePagefilePrivilege 5804 procexp64.exe Token: SeDebugPrivilege 5804 procexp64.exe Token: SeImpersonatePrivilege 5804 procexp64.exe Token: SeSecurityPrivilege 5804 procexp64.exe Token: SeDebugPrivilege 5804 procexp64.exe Token: SeBackupPrivilege 5804 procexp64.exe Token: SeRestorePrivilege 5804 procexp64.exe Token: SeDebugPrivilege 5804 procexp64.exe Token: SeDebugPrivilege 1860 4363463463464363463463463.exe Token: SeDebugPrivilege 3832 Client-built.exe Token: SeDebugPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 5568 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 3308 firefox.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 2692 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 5996 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 2556 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 5760 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 6108 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: 33 5160 govno__dlya_jertwy.exe Token: SeIncBasePriorityPrivilege 5160 govno__dlya_jertwy.exe Token: SeDebugPrivilege 3544 Client-built.exe Token: 33 5160 govno__dlya_jertwy.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe 1836 procexp64.exe -
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 3308 firefox.exe 1836 procexp64.exe 5788 procexp64.exe 5804 procexp64.exe 1864 main1.exe 5876 main1.exe 5804 procexp64.exe 6400 smell-the-roses.exe 2872 up.exe 2872 up.exe 5804 procexp64.exe 7552 updater.exe 664 up.exe 664 up.exe 5776 svchost.exe 7972 Dark_Brout_ncrypt.exe 6036 msdcsc.exe 6924 iexplore.exe 1248 up.exe 1248 up.exe 2624 ktyhpldea.exe 2624 ktyhpldea.exe 6020 Client.exe 1880 test.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 4372 Client.exe 1980 Client.exe 1516 c3.exe 7144 av_downloader.exe 1804 khtoawdltrha.exe 1804 khtoawdltrha.exe 2684 XClient.exe 2520 test.exe 2604 rektupp.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 5432 wudi.exe 1724 firefox.exe 7648 Client.exe 1428 FiddlerSetup.exe 5104 FiddlerSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 844 wrote to memory of 3308 844 firefox.exe 83 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 652 3308 firefox.exe 84 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 PID 3308 wrote to memory of 960 3308 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 10 IoCs
pid Process 7040 attrib.exe 6224 attrib.exe 8924 Process not Found 4284 attrib.exe 4832 attrib.exe 7084 attrib.exe 4080 attrib.exe 8384 Process not Found 2184 Process not Found 7336 Process not Found
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:812
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding2⤵PID:1340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:5780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:6052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:5176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:5188
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.132⤵
- Modifies registry class
PID:6544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:6368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:1232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:7100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:6488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:7372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:5124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:3480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵PID:3556
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Downloaders.zip1⤵PID:4068
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Quasar RAT
- Detected potential entity reuse from brand MICROSOFT.
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b41f116e-5d75-4a3f-8f46-e503f627dad7} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" gpu3⤵PID:652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b97fa1a-f5e1-448f-b22b-3f7e979e09f7} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" socket3⤵
- Checks processor information in registry
PID:960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3232 -childID 1 -isForBrowser -prefsHandle 2956 -prefMapHandle 3036 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fed4ddf-bbf2-432b-8694-133f22f497b7} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3576 -childID 2 -isForBrowser -prefsHandle 3408 -prefMapHandle 2752 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d4165a-ad06-4445-a763-e0de00ef3b79} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:3916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4064 -prefMapHandle 3912 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {841f17d6-df6e-43cc-94e5-6c99ee811ac6} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" utility3⤵
- Checks processor information in registry
PID:2972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 3 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dc22a33-df58-4f8a-ae8e-f1c0c7c6e554} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 4 -isForBrowser -prefsHandle 5852 -prefMapHandle 5860 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be3eba0b-0b72-4fcc-9199-b93870c73793} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:3976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6032 -childID 5 -isForBrowser -prefsHandle 5628 -prefMapHandle 5668 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {607e77c4-d2e4-498b-a94b-fe5a95a29fb5} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6352 -childID 6 -isForBrowser -prefsHandle 6292 -prefMapHandle 6344 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8755688-a75e-4ea0-8438-d66e1464908d} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:4592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6512 -childID 7 -isForBrowser -prefsHandle 6504 -prefMapHandle 6500 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a32f8ea-c8a2-4607-9ea8-7ee7078df697} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" tab3⤵PID:1456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -parentBuildID 20240401114208 -prefsHandle 5892 -prefMapHandle 5888 -prefsLen 32713 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39d0ad1f-83df-4a19-b2a5-0903b39b6ade} 3308 "\\.\pipe\gecko-crash-server-pipe.3308" rdd3⤵PID:4984
-
-
-
C:\Program Files\Sysinternals\procexp64.exe"C:\Program Files\Sysinternals\procexp64.exe"1⤵
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Sets service image path in registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Program Files\Sysinternals\procexp64.exe"C:\Program Files\Sysinternals\procexp64.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.virustotal.com/about/terms-of-service1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc78d3cb8,0x7fffc78d3cc8,0x7fffc78d3cd82⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,4507990766968694903,15314204476891808986,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,4507990766968694903,15314204476891808986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,4507990766968694903,15314204476891808986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4507990766968694903,15314204476891808986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4507990766968694903,15314204476891808986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5812
-
-
C:\Program Files\Sysinternals\procexp64.exe"C:\Program Files\Sysinternals\procexp64.exe"1⤵
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Sets service image path in registry
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5804
-
C:\Users\Admin\Desktop\fun\4363463463464363463463463.exe"C:\Users\Admin\Desktop\fun\4363463463464363463463463.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3832 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TvQeRKIoaF5v.bat" "3⤵PID:2648
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:5544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵PID:5288
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5568 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w8dQMLtgJuvd.bat" "5⤵PID:6112
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6028
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qfhmjB8QbjXH.bat" "7⤵PID:1876
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3912
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵PID:5064
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MbWaXvIgTKT4.bat" "9⤵PID:5124
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5204
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
PID:3604
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TMwsnRIE9xVb.bat" "11⤵PID:2624
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:5460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵PID:5372
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1eV6bgL7zsip.bat" "13⤵PID:4892
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:1416
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fHdEVrkj1LWl.bat" "15⤵PID:540
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:5084
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
PID:4548
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sg8ZOYURn6zR.bat" "17⤵PID:5332
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:2300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵PID:1884
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"18⤵
- Executes dropped EXE
PID:5652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5clT1iXBQCnc.bat" "19⤵PID:4468
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3628
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"20⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sud4OieHeAoL.bat" "21⤵PID:3984
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:6036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵PID:876
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"22⤵
- Executes dropped EXE
PID:5328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w7OqlrLT0WVS.bat" "23⤵PID:5784
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2752
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"24⤵
- Executes dropped EXE
PID:4168 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A0KNTekO4tYm.bat" "25⤵PID:5308
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:5040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵PID:4780
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"26⤵
- Executes dropped EXE
PID:6112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b0P5wEoZDSB2.bat" "27⤵PID:1628
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2232
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4660
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"28⤵
- Executes dropped EXE
PID:5364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZGN4MfERTwTZ.bat" "29⤵PID:1588
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵PID:5268
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"30⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MkO1L7nFVAaH.bat" "31⤵PID:5492
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:1352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵PID:4156
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"32⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S6w86gbuGMOg.bat" "33⤵PID:5288
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:6172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6188
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"34⤵
- Executes dropped EXE
PID:6340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eOVoNdTy3o1T.bat" "35⤵PID:6412
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:6456
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6472
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"36⤵
- Executes dropped EXE
PID:6284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W2k5uUeie5y5.bat" "37⤵PID:6168
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:6400
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6352
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"38⤵
- Executes dropped EXE
PID:6836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ODdbmzTzdQUm.bat" "39⤵PID:6904
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:6956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵PID:7004
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"40⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P5Vd7o1chbf6.bat" "41⤵PID:6840
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:7016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵PID:5520
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"42⤵
- Executes dropped EXE
PID:7076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oSlURgTyJ1JT.bat" "43⤵PID:1696
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:6976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵PID:5204
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"44⤵
- Executes dropped EXE
PID:5232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CGybsbPyLjKK.bat" "45⤵PID:5984
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:5344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵PID:3648
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"46⤵
- Executes dropped EXE
PID:8144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wNPmQUl8BjVZ.bat" "47⤵PID:7888
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:5424
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵PID:7948
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"48⤵
- Executes dropped EXE
PID:7712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Si57TeMXeXdM.bat" "49⤵PID:3480
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:5288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵PID:2036
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"50⤵
- Executes dropped EXE
PID:7240 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1oOQsT8dufIQ.bat" "51⤵PID:7540
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:7752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵PID:7740
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"52⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Nk8PSUmEZQpJ.bat" "53⤵PID:7592
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:5496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵PID:5240
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"54⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lxLFf7BjkA6Z.bat" "55⤵PID:3744
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:900
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
PID:7896
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"56⤵
- Executes dropped EXE
PID:1328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ELY5NtL43vfU.bat" "57⤵PID:1820
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:2868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵PID:6820
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"58⤵
- Executes dropped EXE
PID:568 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\poBfn3uiwvdu.bat" "59⤵PID:4384
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:2476
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3440
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"60⤵
- Executes dropped EXE
PID:5412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s2VzRvkO35uN.bat" "61⤵PID:3540
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:5288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵PID:6996
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"62⤵
- Executes dropped EXE
PID:3400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NfiwKEm7Ezio.bat" "63⤵PID:7868
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:3816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵PID:4432
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"64⤵
- Executes dropped EXE
PID:5644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l24EapMIuJ8Z.bat" "65⤵PID:7824
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:2072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵PID:6636
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"66⤵
- Executes dropped EXE
PID:7064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hgj95W38kK8a.bat" "67⤵PID:1980
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:7028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵PID:3604
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"68⤵
- Executes dropped EXE
PID:7676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qYsqhG1wKnHF.bat" "69⤵PID:5272
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:6800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- Runs ping.exe
PID:7684
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"70⤵PID:7068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6Cz6bnnEDgYR.bat" "71⤵PID:1188
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:3112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- Runs ping.exe
PID:7252
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"72⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l1RPxA6U1Yyv.bat" "73⤵PID:1440
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:6204
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- Runs ping.exe
PID:2500
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"74⤵PID:1792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\01qtiAOcetEW.bat" "75⤵PID:4176
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:7736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5408
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"76⤵PID:6724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EFGnrCqtuphd.bat" "77⤵PID:6968
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:5912
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵PID:1912
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"78⤵PID:2308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sKlV2xig0Ny0.bat" "79⤵PID:7024
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:8164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵PID:3816
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"80⤵PID:7000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZWOHJKsiieaV.bat" "81⤵PID:4800
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:7928
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵PID:7640
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"82⤵PID:5188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tKHsMq36H40I.bat" "83⤵PID:5276
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:3336
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- Runs ping.exe
PID:3916
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"84⤵PID:7300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kwgH3n92YlHs.bat" "85⤵PID:8012
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:6292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- Runs ping.exe
PID:3716
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"86⤵PID:2972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QFK3qxjGoiO8.bat" "87⤵PID:5588
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:5396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵PID:2260
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"88⤵PID:5836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uW8USeBQfbMc.bat" "89⤵PID:6956
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:5448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵PID:6204
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"90⤵PID:6740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U6vQyAuePeS1.bat" "91⤵PID:7492
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:4068
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵PID:3180
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"92⤵PID:6560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PQAWVihpzQ39.bat" "93⤵PID:8016
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:8156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵PID:2244
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"94⤵PID:7152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tNQEAgW6ZkGl.bat" "95⤵PID:7252
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:6420
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵PID:7488
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"96⤵PID:2968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fBBCZjIf8X8z.bat" "97⤵PID:8180
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:2064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- Runs ping.exe
PID:7140
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"98⤵PID:7352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DValAC9xSKQx.bat" "99⤵PID:7768
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:1440
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- Runs ping.exe
PID:2724
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"100⤵PID:2112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YJtbl6hitHfj.bat" "101⤵PID:3680
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:3472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2744
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"102⤵PID:2712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5c9Ex6e1k7w4.bat" "103⤵PID:7444
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:5336
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵PID:5132
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"104⤵PID:2404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2bSRSBdO56lP.bat" "105⤵PID:6928
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:7536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵PID:6272
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"106⤵PID:8044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AxaHpXrdMpPp.bat" "107⤵PID:1944
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:3212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵PID:6016
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"108⤵PID:6168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B7mutFcQgq6v.bat" "109⤵PID:2332
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:5860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵PID:6460
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"110⤵PID:7028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1ofFLHmBjaMo.bat" "111⤵PID:3444
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:6156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵PID:6648
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"112⤵PID:5720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mhp78aLpHZrb.bat" "113⤵PID:3508
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:7788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵PID:7116
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"114⤵PID:7180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w8LZX7DlSVJy.bat" "115⤵PID:5148
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:7036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵PID:5036
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"116⤵PID:4380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3PuC4WGw2YDF.bat" "117⤵PID:5296
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:6120
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵PID:7612
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"118⤵PID:5220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\729WDau5Bo9f.bat" "119⤵PID:3436
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:8108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- Runs ping.exe
PID:4368
-
-
C:\Users\Admin\Desktop\fun\Files\Client-built.exe"C:\Users\Admin\Desktop\fun\Files\Client-built.exe"120⤵PID:7256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6J2TxPZ4ldKB.bat" "121⤵PID:7600
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:5628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-