79dc113a4194e48e01b39d39156ce6b3bd50e02a5b07c1e1f40dd6c4b4cea967
5KB
220521-psmewsbbdn
3d83b9debba178eca1ba8fce39e15f7c
9839eade0225a2f803cb539ca4f8237aed2e2040
79dc113a4194e48e01b39d39156ce6b3bd50e02a5b07c1e1f40dd6c4b4cea967
071ed4215873624fb9d2796d82bda6270928ab38d27d963c7c00ee300f9cb0390480ab67495abce0c8dd408bf3ab697f8e77efbbe2ad6cf32d9913e03e6f1671
Bolbi.vbs
99ec3237394257cb0b5c24affe458f48
46KB
5300e68423da9712280e601b51622c4b567a23a4
ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51
af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb
Tags
Signatures
-
UAC bypass
-
Blocklisted process makes network request
-
Disables cmd.exe use via registry modification
Tags
-
Modifies Installed Components in the registry
Tags
TTPs
-
Possible privilege escalation attempt
Tags
-
Sets file execution options in registry
Tags
TTPs
-
Checks computer location settings
Description
Looks up country code configured in the registry, likely geofence.
TTPs
-
Modifies file permissions
Tags
TTPs
-
Adds Run key to start application
Tags
TTPs
-
Checks whether UAC is enabled
Tags
TTPs
-
Enumerates connected drives
Description
Attempts to read the root path of hard drives other than the default C: drive.
TTPs
-
Sets desktop wallpaper using registry
Tags
TTPs