Resubmissions
25-05-2020 16:07
200525-ddd1ggsbdj 10Analysis
-
max time kernel
1031s -
max time network
1799s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
25-05-2020 16:07
Static task
static1
Behavioral task
behavioral1
Sample
Kaufvertrag_648230011400_21052020.vbs
Resource
win7v200430
General
-
Target
Kaufvertrag_648230011400_21052020.vbs
-
Size
36.3MB
-
MD5
86d77e33adbd08281bde87c925026219
-
SHA1
62393354f0037c8f56ebc33606b43ee71de3079b
-
SHA256
bfca22cf77eb45df30fa08fa3995163683633919c30332d60d015eaf23544194
-
SHA512
d1a0dc4c63e8e309366eb48bf9d124a546dfa689636880d968b80ddb92548f3d21043cd2fe22b8ea5673648c0ee1ee0c533323062579cd5bd7960a4a6e694368
Malware Config
Extracted
qakbot
spx125
1590138228
190.75.168.108:2078
93.114.192.211:2222
47.39.76.74:443
182.56.134.44:995
24.201.79.208:2078
207.246.71.122:443
50.244.112.10:443
88.207.27.144:443
72.204.242.138:443
72.204.242.138:2078
72.204.242.138:990
76.187.8.160:443
220.135.31.140:2222
86.126.97.183:2222
86.126.112.153:995
68.49.120.179:443
101.108.125.44:443
203.101.163.187:443
197.165.212.10:443
207.255.161.8:2078
207.255.161.8:995
98.243.187.85:443
207.255.161.8:32103
108.227.161.27:995
189.140.112.184:443
172.78.87.180:443
71.205.158.156:443
72.28.255.159:995
68.39.177.147:995
73.94.229.115:443
108.58.9.238:995
1.40.42.4:443
74.33.69.208:443
66.222.88.126:995
72.204.242.138:53
24.99.180.247:443
47.152.210.233:443
24.10.42.174:443
140.82.21.191:443
72.190.101.70:443
78.188.109.130:443
211.24.72.253:443
70.124.29.226:443
71.241.247.189:443
216.201.162.158:443
24.43.22.220:993
46.214.139.81:443
49.191.9.180:995
75.183.135.48:443
47.153.115.154:995
50.247.230.33:995
70.183.127.6:995
76.170.77.99:443
188.26.98.35:443
66.68.22.151:443
137.99.224.198:443
75.81.25.223:443
97.127.144.203:2222
76.111.128.194:443
50.78.93.74:443
171.97.10.201:2222
72.204.242.138:50003
67.170.137.8:443
24.122.228.88:443
72.186.1.237:443
189.159.148.145:995
203.106.195.139:443
100.12.173.247:995
98.121.187.78:443
79.78.131.124:443
98.116.62.242:443
89.137.215.100:443
173.245.152.231:443
68.204.164.222:443
217.162.149.212:443
95.77.223.168:443
72.132.249.144:995
79.114.196.138:443
85.122.141.42:443
188.173.70.18:443
117.217.231.113:443
47.202.98.230:443
80.14.209.42:2222
103.76.160.110:443
210.195.177.30:443
24.226.137.154:443
50.244.112.106:443
172.242.156.50:443
5.107.239.212:2222
81.133.234.36:2222
79.116.237.126:443
77.237.188.30:995
5.12.214.109:2222
174.130.225.61:443
102.41.118.44:995
197.50.133.40:443
84.117.176.32:443
24.202.42.48:2222
98.32.60.217:443
72.16.212.108:465
67.250.184.157:443
85.186.50.42:443
98.16.204.189:995
154.56.64.21:443
99.196.208.15:443
72.204.242.138:995
72.29.181.77:2078
72.240.245.253:443
96.56.237.174:990
47.40.244.237:443
100.4.173.223:443
71.213.29.14:995
65.100.244.179:2083
173.90.33.182:2222
104.36.135.227:443
173.175.29.210:443
102.190.246.65:6881
68.4.137.211:443
61.3.126.96:443
188.25.233.157:2222
82.79.67.68:443
73.163.242.114:443
100.38.123.22:443
96.18.240.158:443
71.8.33.238:443
5.182.39.156:443
199.116.241.147:443
94.10.81.239:443
104.221.4.11:2222
184.180.157.203:2222
82.210.157.185:443
65.60.228.130:443
96.56.237.174:465
72.204.242.138:50001
67.165.206.193:995
75.87.161.32:995
64.19.74.29:995
72.204.242.138:32102
187.155.67.97:443
68.174.15.223:443
176.223.114.184:443
197.210.96.222:995
71.77.252.14:2222
46.214.62.199:443
71.185.60.227:443
68.207.50.2:443
108.27.217.44:443
74.134.46.7:443
Extracted
qakbot
notset
1588850855
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
24.110.14.40:443
96.35.170.82:2222
50.78.93.74:443
76.187.97.98:2222
202.77.4.37:443
89.38.171.30:443
66.26.160.37:443
58.108.188.231:443
67.83.54.76:2222
102.41.116.213:995
78.96.245.58:443
176.193.14.165:2222
73.1.68.242:443
96.37.113.36:443
98.22.234.245:443
76.15.41.32:443
95.77.235.132:0
24.226.137.154:443
24.99.180.247:443
24.43.22.220:995
41.228.192.103:443
96.37.137.42:443
97.78.107.14:443
70.120.149.173:443
96.41.93.96:443
207.255.94.98:443
63.230.2.205:2083
216.152.7.12:443
97.96.51.117:443
72.240.124.46:443
173.3.132.17:995
178.236.108.131:443
47.138.200.85:443
207.255.161.8:443
75.81.25.223:995
100.38.123.22:443
84.117.176.32:443
80.14.209.42:2222
67.165.206.193:995
47.153.115.154:443
104.36.135.227:443
173.173.68.41:443
86.126.50.168:21
100.40.48.96:443
47.205.231.60:443
216.201.162.158:443
108.185.108.124:443
47.202.98.230:443
68.174.15.223:443
47.17.70.45:443
188.115.130.128:443
68.1.171.93:443
79.118.188.252:443
72.204.242.138:990
75.110.93.212:443
134.19.208.152:443
72.204.242.138:2078
108.31.85.191:1194
63.155.71.107:995
86.124.13.37:443
71.77.231.251:443
172.95.42.35:443
65.116.179.83:443
184.21.151.81:995
72.204.242.138:993
64.121.114.87:443
100.37.33.10:443
72.204.242.138:50003
24.202.42.48:2222
142.129.227.86:443
207.255.161.8:2078
108.27.217.44:443
72.204.242.138:53
46.214.152.89:443
82.77.177.33:443
31.5.168.31:443
107.5.252.194:443
5.15.62.250:443
65.131.110.141:995
41.97.159.163:443
24.88.76.111:443
86.127.144.244:2222
98.118.156.172:443
24.203.36.180:2222
78.97.145.242:443
203.213.104.25:995
71.88.104.107:443
89.45.102.218:2222
89.44.194.21:443
65.60.228.130:443
72.204.242.138:465
70.57.15.187:993
64.19.74.29:995
75.183.171.155:3389
81.103.144.77:443
134.0.196.46:995
24.67.37.137:443
49.191.9.180:995
71.163.225.75:443
50.247.230.33:995
72.204.242.138:443
137.99.224.198:443
67.131.59.17:443
72.190.101.70:443
83.25.18.252:2222
24.201.79.208:2078
72.45.14.185:443
182.56.134.44:995
50.246.229.50:443
50.104.186.71:443
121.74.205.27:995
199.241.223.66:443
92.5.146.37:2222
72.16.212.107:465
188.26.150.82:2222
98.32.60.217:443
67.209.195.198:3389
110.142.29.212:443
203.33.139.134:443
24.46.40.189:2222
68.49.120.179:443
98.115.138.61:443
79.119.126.161:443
47.40.244.237:443
24.27.82.216:2222
116.202.36.62:21
71.187.170.235:443
216.163.4.91:443
75.87.161.32:995
188.247.252.236:443
71.77.252.14:2222
69.123.179.70:443
94.53.92.42:443
118.174.167.6:443
173.175.29.210:443
201.215.29.153:443
86.22.41.176:443
72.209.191.27:443
94.52.160.116:443
74.75.237.11:443
93.114.246.67:443
72.204.242.138:32102
156.222.109.244:995
76.170.77.99:443
50.108.212.180:443
108.227.161.27:995
67.170.137.8:443
50.244.112.10:443
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000131b4-0.dat cryptone behavioral1/files/0x00040000000131b4-2.dat cryptone behavioral1/files/0x00040000000131b4-3.dat cryptone behavioral1/files/0x00040000000131b4-4.dat cryptone behavioral1/files/0x00030000000131ba-6.dat cryptone behavioral1/files/0x00030000000131ba-7.dat cryptone behavioral1/files/0x00030000000131ba-8.dat cryptone behavioral1/files/0x00030000000131ba-9.dat cryptone behavioral1/files/0x00030000000131ba-10.dat cryptone behavioral1/files/0x00040000000131b4-14.dat cryptone behavioral1/files/0x00030000000131ba-15.dat cryptone behavioral1/files/0x00030000000131ba-16.dat cryptone behavioral1/files/0x00030000000131ba-17.dat cryptone behavioral1/files/0x00130000000131bb-19.dat cryptone behavioral1/files/0x00130000000131bb-20.dat cryptone behavioral1/files/0x00130000000131bb-21.dat cryptone behavioral1/files/0x00030000000131ba-22.dat cryptone behavioral1/files/0x00030000000131ba-23.dat cryptone behavioral1/files/0x00030000000131ba-24.dat cryptone behavioral1/files/0x00030000000131ba-25.dat cryptone behavioral1/files/0x00030000000131ba-26.dat cryptone behavioral1/files/0x00030000000131ba-27.dat cryptone behavioral1/files/0x00030000000131ba-28.dat cryptone -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1016 WScript.exe -
Executes dropped EXE 11 IoCs
pid Process 464 PicturesViewer.exe 976 PicturesViewer.exe 1296 oovgku.exe 1596 oovgku.exe 1484 PicturesViewer.exe 1676 oovgku.exe 316 oovgku.exe 1956 gzsimndyjihsrmcsgwxdsyceehqpeq.exe 1652 oovgku.exe 1532 oovgku.exe 1332 oovgku.exe -
Loads dropped DLL 9 IoCs
pid Process 464 PicturesViewer.exe 464 PicturesViewer.exe 464 PicturesViewer.exe 1484 PicturesViewer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\zmcqct = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Wnreo\\oovgku.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1584 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007cf8d5bd09b0364592b95b96ab312388000000000200000000001066000000010000200000008e6b66e95ea528b716694ff3cbbd9d40fb6cdb8ad823e8b4bbaba3ce7bc5f36c000000000e8000000002000020000000905cd1103a896dcaaba4ca8f17df4f61c45064af2a7380e866da1fe640414cb190000000b6e5b454bc5108bbb0e49440d19721b6442d83f7b875f5c44d1d37da9c3f13d0321d1c3ffb9b696b46941c3e376666b0734b62a852589b9123ef622500627e6fc8264b96a0c39b038c9cd2f5612716aae7884a1c2f5fca4eb36dfefa3d5c1e4e5350de16502f5319ec25179ae6fe069e7d6e7cfa857c74635ad03c18888c28a55d41f606c4b67344e1ecb53ccd56b2614000000044008d0fc402f1845020bb850354f03fc83cc74b9f27b7743fe4e768afc71a2c7a988db99b39b02e9318551ac18f64cd9acb7e24de191daadb5887b6025c96d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E95F1531-9EB4-11EA-818A-DE6ED157E5B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007cf8d5bd09b0364592b95b96ab31238800000000020000000000106600000001000020000000bc93e1c5c71f4d68d837b468d9ef3871d015f18effdfe8aa4150ca0076cde7a4000000000e80000000020000200000005ef80d8f4150e9af1702cf38f02f7f78a738ed70d1417576030139626a746307200000009230e50956897cbcd12c17028a7cb4199061dd4a0e0a84e4b116c7f49048cf1a40000000477be4fe72f3168522c884e9c021c492abf6ed6eee7a2b03055caed385a3e40437b1da1bf7b7438b6750a821dc1db190e3bfb059ab13da0cd5eb16e2d2269f65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3001e2b6c132d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PicturesViewer.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 728 PING.EXE 1732 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 464 PicturesViewer.exe 976 PicturesViewer.exe 976 PicturesViewer.exe 1296 oovgku.exe 1596 oovgku.exe 1596 oovgku.exe 1580 explorer.exe 1580 explorer.exe 1484 PicturesViewer.exe 1676 oovgku.exe 316 oovgku.exe 316 oovgku.exe 1580 explorer.exe 1580 explorer.exe 1956 gzsimndyjihsrmcsgwxdsyceehqpeq.exe 1652 oovgku.exe 1532 oovgku.exe 1332 oovgku.exe 1332 oovgku.exe 1028 explorer.exe 1928 explorer.exe 1164 taskhost.exe 1272 Dwm.exe 784 DllHost.exe 1336 Explorer.EXE 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe 1928 explorer.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1296 oovgku.exe 1532 oovgku.exe 1028 explorer.exe 1028 explorer.exe 1028 explorer.exe 1028 explorer.exe 1028 explorer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeManageVolumePrivilege 1532 explorer.exe Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE Token: SeShutdownPrivilege 1336 Explorer.EXE -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 2788 iexplore.exe 2788 iexplore.exe 2868 firefox.exe 2868 firefox.exe 2868 firefox.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 2868 firefox.exe 2868 firefox.exe 2868 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2788 iexplore.exe 2788 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 464 1016 WScript.exe 27 PID 1016 wrote to memory of 464 1016 WScript.exe 27 PID 1016 wrote to memory of 464 1016 WScript.exe 27 PID 1016 wrote to memory of 464 1016 WScript.exe 27 PID 464 wrote to memory of 976 464 PicturesViewer.exe 28 PID 464 wrote to memory of 976 464 PicturesViewer.exe 28 PID 464 wrote to memory of 976 464 PicturesViewer.exe 28 PID 464 wrote to memory of 976 464 PicturesViewer.exe 28 PID 464 wrote to memory of 1296 464 PicturesViewer.exe 29 PID 464 wrote to memory of 1296 464 PicturesViewer.exe 29 PID 464 wrote to memory of 1296 464 PicturesViewer.exe 29 PID 464 wrote to memory of 1296 464 PicturesViewer.exe 29 PID 464 wrote to memory of 1584 464 PicturesViewer.exe 30 PID 464 wrote to memory of 1584 464 PicturesViewer.exe 30 PID 464 wrote to memory of 1584 464 PicturesViewer.exe 30 PID 464 wrote to memory of 1584 464 PicturesViewer.exe 30 PID 1296 wrote to memory of 1596 1296 oovgku.exe 32 PID 1296 wrote to memory of 1596 1296 oovgku.exe 32 PID 1296 wrote to memory of 1596 1296 oovgku.exe 32 PID 1296 wrote to memory of 1596 1296 oovgku.exe 32 PID 1296 wrote to memory of 1580 1296 oovgku.exe 33 PID 1296 wrote to memory of 1580 1296 oovgku.exe 33 PID 1296 wrote to memory of 1580 1296 oovgku.exe 33 PID 1296 wrote to memory of 1580 1296 oovgku.exe 33 PID 1296 wrote to memory of 1580 1296 oovgku.exe 33 PID 1972 wrote to memory of 1484 1972 taskeng.exe 37 PID 1972 wrote to memory of 1484 1972 taskeng.exe 37 PID 1972 wrote to memory of 1484 1972 taskeng.exe 37 PID 1972 wrote to memory of 1484 1972 taskeng.exe 37 PID 1484 wrote to memory of 664 1484 PicturesViewer.exe 38 PID 1484 wrote to memory of 664 1484 PicturesViewer.exe 38 PID 1484 wrote to memory of 664 1484 PicturesViewer.exe 38 PID 1484 wrote to memory of 664 1484 PicturesViewer.exe 38 PID 1484 wrote to memory of 1232 1484 PicturesViewer.exe 40 PID 1484 wrote to memory of 1232 1484 PicturesViewer.exe 40 PID 1484 wrote to memory of 1232 1484 PicturesViewer.exe 40 PID 1484 wrote to memory of 1232 1484 PicturesViewer.exe 40 PID 1484 wrote to memory of 1332 1484 PicturesViewer.exe 42 PID 1484 wrote to memory of 1332 1484 PicturesViewer.exe 42 PID 1484 wrote to memory of 1332 1484 PicturesViewer.exe 42 PID 1484 wrote to memory of 1332 1484 PicturesViewer.exe 42 PID 1484 wrote to memory of 436 1484 PicturesViewer.exe 44 PID 1484 wrote to memory of 436 1484 PicturesViewer.exe 44 PID 1484 wrote to memory of 436 1484 PicturesViewer.exe 44 PID 1484 wrote to memory of 436 1484 PicturesViewer.exe 44 PID 1484 wrote to memory of 1756 1484 PicturesViewer.exe 46 PID 1484 wrote to memory of 1756 1484 PicturesViewer.exe 46 PID 1484 wrote to memory of 1756 1484 PicturesViewer.exe 46 PID 1484 wrote to memory of 1756 1484 PicturesViewer.exe 46 PID 1484 wrote to memory of 1028 1484 PicturesViewer.exe 48 PID 1484 wrote to memory of 1028 1484 PicturesViewer.exe 48 PID 1484 wrote to memory of 1028 1484 PicturesViewer.exe 48 PID 1484 wrote to memory of 1028 1484 PicturesViewer.exe 48 PID 1484 wrote to memory of 1780 1484 PicturesViewer.exe 50 PID 1484 wrote to memory of 1780 1484 PicturesViewer.exe 50 PID 1484 wrote to memory of 1780 1484 PicturesViewer.exe 50 PID 1484 wrote to memory of 1780 1484 PicturesViewer.exe 50 PID 1484 wrote to memory of 584 1484 PicturesViewer.exe 52 PID 1484 wrote to memory of 584 1484 PicturesViewer.exe 52 PID 1484 wrote to memory of 584 1484 PicturesViewer.exe 52 PID 1484 wrote to memory of 584 1484 PicturesViewer.exe 52 PID 1484 wrote to memory of 1384 1484 PicturesViewer.exe 54 PID 1484 wrote to memory of 1384 1484 PicturesViewer.exe 54 PID 1484 wrote to memory of 1384 1484 PicturesViewer.exe 54
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Kaufvertrag_648230011400_21052020.vbs"2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe /C5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Users\Admin\gzsimndyjihsrmcsgwxdsyceehqpeq.exe"C:\Users\Admin\gzsimndyjihsrmcsgwxdsyceehqpeq.exe" /W6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe" /W6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1532 -
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe /C7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1028 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵PID:1212
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵PID:2036
-
C:\Windows\system32\ping.exeC:\Windows\system32\ping.exe -t 127.0.0.19⤵
- Runs ping.exe
PID:1732 -
C:\Windows\system32\cmd.execmd.exe /c "rmdir /S /Q "C:\Users\Admin\EmailStorage_DJRWGDLZ-Admin_1590430698""10⤵PID:1596
-
-
C:\Windows\system32\cmd.execmd.exe /c rmdir /S /Q "C:\Users\Admin\EmailStorage_DJRWGDLZ-Admin_1590430698"10⤵PID:1380
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵PID:1552
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" http://a.strandsglobal.com/redir_chrome.html9⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1576 -
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=81.0.4044.129 --initial-client-data=0xa4,0xa8,0xac,0x78,0xb0,0x7fef756bd28,0x7fef756bd38,0x7fef756bd4810⤵PID:1732
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1988 --on-initialized-event-handle=372 --parent-handle=376 /prefetch:610⤵PID:1104
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1120 --ignored=" --type=renderer " /prefetch:210⤵PID:1304
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1296 /prefetch:810⤵PID:1912
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:110⤵PID:1040
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:110⤵PID:1672
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2436 --ignored=" --type=renderer " /prefetch:810⤵PID:2040
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2524 --ignored=" --type=renderer " /prefetch:210⤵PID:1992
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=820 --ignored=" --type=renderer " /prefetch:810⤵PID:848
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:110⤵PID:1300
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2656 --ignored=" --type=renderer " /prefetch:810⤵PID:2316
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2768 --ignored=" --type=renderer " /prefetch:810⤵PID:2360
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2648 --ignored=" --type=renderer " /prefetch:810⤵PID:2408
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2764 --ignored=" --type=renderer " /prefetch:810⤵PID:2456
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --disable-gpu-compositing --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:110⤵PID:2504
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:110⤵PID:2624
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --no-sandbox --enable-audio-service-sandbox --mojo-platform-channel-handle=3892 /prefetch:810⤵PID:2608
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4012 --ignored=" --type=renderer " /prefetch:810⤵PID:2732
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3112 --ignored=" --type=renderer " /prefetch:810⤵PID:2812
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4000 --ignored=" --type=renderer " /prefetch:810⤵PID:2896
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3476 --ignored=" --type=renderer " /prefetch:810⤵PID:3040
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --disable-gpu-compositing --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:110⤵PID:2144
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1088,17700626457900721779,8139213244210543413,131072 --lang=en-US --no-sandbox --enable-audio-service-sandbox --mojo-platform-channel-handle=2504 /prefetch:810⤵PID:2780
-
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" https://en.wikipedia.org/wiki/Google_Chrome9⤵PID:2528
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=81.0.4044.129 --initial-client-data=0xa4,0xa8,0xac,0x78,0xb0,0x7fef756bd28,0x7fef756bd38,0x7fef756bd4810⤵PID:2564
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://a.strandsglobal.com/redir_ff.html9⤵PID:2664
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://a.strandsglobal.com/redir_ff.html10⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2868 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2868.0.173046202\2017778248" -parentBuildID 20200403170909 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 1 -prefMapSize 219627 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2868 "\\.\pipe\gecko-crash-server-pipe.2868" 1276 gpu11⤵PID:2368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2868.3.1758841169\741188648" -childID 1 -isForBrowser -prefsHandle 1740 -prefMapHandle 1736 -prefsLen 122 -prefMapSize 219627 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2868 "\\.\pipe\gecko-crash-server-pipe.2868" 1752 tab11⤵PID:2984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2868.13.1838609176\696642752" -childID 2 -isForBrowser -prefsHandle 1992 -prefMapHandle 1988 -prefsLen 162 -prefMapSize 219627 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2868 "\\.\pipe\gecko-crash-server-pipe.2868" 2004 tab11⤵PID:2548
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.mozilla.org/en-US/firefox/new/9⤵PID:2792
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.mozilla.org/en-US/firefox/new/10⤵
- Checks processor information in registry
PID:2804
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://a.strandsglobal.com/redir_ie.html9⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:209935 /prefetch:210⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://a.strandsglobal.com/redir_ie.html9⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C start microsoft-edge:http://a.strandsglobal.com/redir_ie.html9⤵PID:2360
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nnctjjzkc /tr "\"C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe\" /I nnctjjzkc" /SC ONCE /Z /ST 18:11 /ET 18:234⤵
- Creates scheduled task(s)
PID:1584
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0964705B-0BED-46D5-AC7B-D7AD2C981500} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /I nnctjjzkc2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:664
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1232
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1332
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:436
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1756
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1028
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1780
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:584
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo" /d "0"3⤵PID:1384
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wnreo\oovgku.exe /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe"3⤵PID:1080
-
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
PID:728
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN nnctjjzkc3⤵PID:1524
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious behavior: EnumeratesProcesses
PID:784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3028
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "12828557171773602869-1471060997-430253134-1596381525-18238905301354321910-1607829069"1⤵PID:2492