Analysis
-
max time kernel
34s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe
Resource
win10v2004-20220812-en
General
-
Target
f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe
-
Size
725KB
-
MD5
080b826aa20d1af44d0004f3f8dc3420
-
SHA1
fb5bfc73eea105b209b164a2157080be6da6b2e3
-
SHA256
f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237
-
SHA512
249927fbf1ef5ac6388920cbcb428ef2bfe5804d94d48e3ba6a15d23cf61f5018f073d2a50c07dc24ecc9548eaaea5a21b737fbe6f23e7f7b8a30673744c4f77
-
SSDEEP
12288:an/FJz6EkQEokBVr4U7VJwy0CgRs/t/hEughoeMqLE0BiTZmy+jt3/K8:an/kQEoDUxCy0i5Eughoe9I08m3x/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\BCgIoEUY\\fokocMks.exe," f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\BCgIoEUY\\fokocMks.exe," f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Executes dropped EXE 6 IoCs
pid Process 1496 CEEcskkc.exe 2148 fokocMks.exe 2488 WWoEUsAc.exe 2368 CEEcskkc.exe 2060 fokocMks.exe 3064 WWoEUsAc.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fokocMks.exe = "C:\\ProgramData\\BCgIoEUY\\fokocMks.exe" f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CEEcskkc.exe = "C:\\Users\\Admin\\WMIgoUws\\CEEcskkc.exe" CEEcskkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fokocMks.exe = "C:\\ProgramData\\BCgIoEUY\\fokocMks.exe" fokocMks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fokocMks.exe = "C:\\ProgramData\\BCgIoEUY\\fokocMks.exe" WWoEUsAc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CEEcskkc.exe = "C:\\Users\\Admin\\WMIgoUws\\CEEcskkc.exe" f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\WMIgoUws WWoEUsAc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\WMIgoUws\CEEcskkc WWoEUsAc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 21 IoCs
pid Process 312 reg.exe 2280 reg.exe 4776 reg.exe 2012 reg.exe 1768 reg.exe 1380 reg.exe 1836 reg.exe 4736 reg.exe 312 reg.exe 2192 reg.exe 3036 reg.exe 4864 reg.exe 1452 reg.exe 4932 reg.exe 4788 reg.exe 796 reg.exe 2064 reg.exe 3928 reg.exe 1260 reg.exe 3352 reg.exe 1848 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 5036 vssvc.exe Token: SeRestorePrivilege 5036 vssvc.exe Token: SeAuditPrivilege 5036 vssvc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3956 wrote to memory of 4912 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 81 PID 3956 wrote to memory of 4912 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 81 PID 3956 wrote to memory of 4912 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 81 PID 3956 wrote to memory of 1496 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 82 PID 3956 wrote to memory of 1496 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 82 PID 3956 wrote to memory of 1496 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 82 PID 3956 wrote to memory of 2148 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 83 PID 3956 wrote to memory of 2148 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 83 PID 3956 wrote to memory of 2148 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 83 PID 1496 wrote to memory of 2368 1496 CEEcskkc.exe 85 PID 1496 wrote to memory of 2368 1496 CEEcskkc.exe 85 PID 1496 wrote to memory of 2368 1496 CEEcskkc.exe 85 PID 2148 wrote to memory of 2060 2148 fokocMks.exe 86 PID 2148 wrote to memory of 2060 2148 fokocMks.exe 86 PID 2148 wrote to memory of 2060 2148 fokocMks.exe 86 PID 2488 wrote to memory of 3064 2488 WWoEUsAc.exe 87 PID 2488 wrote to memory of 3064 2488 WWoEUsAc.exe 87 PID 2488 wrote to memory of 3064 2488 WWoEUsAc.exe 87 PID 3956 wrote to memory of 3188 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 88 PID 3956 wrote to memory of 3188 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 88 PID 3956 wrote to memory of 3188 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 88 PID 3188 wrote to memory of 988 3188 cmd.exe 90 PID 3188 wrote to memory of 988 3188 cmd.exe 90 PID 3188 wrote to memory of 988 3188 cmd.exe 90 PID 3956 wrote to memory of 3928 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 91 PID 3956 wrote to memory of 3928 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 91 PID 3956 wrote to memory of 3928 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 91 PID 3956 wrote to memory of 3036 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 92 PID 3956 wrote to memory of 3036 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 92 PID 3956 wrote to memory of 3036 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 92 PID 3956 wrote to memory of 2012 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 145 PID 3956 wrote to memory of 2012 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 145 PID 3956 wrote to memory of 2012 3956 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 145 PID 988 wrote to memory of 3268 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 97 PID 988 wrote to memory of 3268 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 97 PID 988 wrote to memory of 3268 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 97 PID 988 wrote to memory of 1456 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 103 PID 988 wrote to memory of 1456 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 103 PID 988 wrote to memory of 1456 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 103 PID 1456 wrote to memory of 4524 1456 cmd.exe 105 PID 1456 wrote to memory of 4524 1456 cmd.exe 105 PID 1456 wrote to memory of 4524 1456 cmd.exe 105 PID 988 wrote to memory of 1260 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 106 PID 988 wrote to memory of 1260 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 106 PID 988 wrote to memory of 1260 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 106 PID 988 wrote to memory of 4864 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 107 PID 988 wrote to memory of 4864 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 107 PID 988 wrote to memory of 4864 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 107 PID 988 wrote to memory of 3352 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 130 PID 988 wrote to memory of 3352 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 130 PID 988 wrote to memory of 3352 988 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 130 PID 4524 wrote to memory of 3628 4524 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 112 PID 4524 wrote to memory of 3628 4524 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 112 PID 4524 wrote to memory of 3628 4524 f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe"C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK2⤵PID:4912
-
-
C:\Users\Admin\WMIgoUws\CEEcskkc.exe"C:\Users\Admin\WMIgoUws\CEEcskkc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\WMIgoUws\CEEcskkc.exeQVIR3⤵
- Executes dropped EXE
PID:2368
-
-
-
C:\ProgramData\BCgIoEUY\fokocMks.exe"C:\ProgramData\BCgIoEUY\fokocMks.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\ProgramData\BCgIoEUY\fokocMks.exeHBYZ3⤵
- Executes dropped EXE
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"2⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e1352373⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK4⤵PID:3268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"4⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e1352375⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK6⤵PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"6⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e1352377⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK8⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"8⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e1352379⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK10⤵PID:3452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"10⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e13523711⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK12⤵PID:3632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237"12⤵PID:392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- UAC bypass
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeC:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e13523713⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237.exeHOUK14⤵PID:3604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
PID:312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:2064
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:2192
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
PID:312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:2280
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
PID:4776
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
PID:1836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:796
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
PID:4736
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:1848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:1768
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:4788 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- UAC bypass
PID:3352
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:1380
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:1452
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:4932
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:4864
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:3352
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:2012
-
-
C:\ProgramData\LCoYoEsY\WWoEUsAc.exeC:\ProgramData\LCoYoEsY\WWoEUsAc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\ProgramData\LCoYoEsY\WWoEUsAc.exeXJPF2⤵
- Executes dropped EXE
PID:3064
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
714KB
MD5fcb65f753387e57c4d8f66d73a3e96d4
SHA1a40cfb74fc5f28149cd8c6ca92e6d7f975c44f0c
SHA2562754318f278869ee193192df55baee089b6283984b2e108d17508efaf013108d
SHA51244f5c58c14c4e80879ece5ede263bf418ecdcc73f6661db4c4c8bcd553442c69654f32ec7677809b4a433b9da0403080df9837b9e6a5cb6a2482dfc88038a3f3
-
Filesize
714KB
MD5fcb65f753387e57c4d8f66d73a3e96d4
SHA1a40cfb74fc5f28149cd8c6ca92e6d7f975c44f0c
SHA2562754318f278869ee193192df55baee089b6283984b2e108d17508efaf013108d
SHA51244f5c58c14c4e80879ece5ede263bf418ecdcc73f6661db4c4c8bcd553442c69654f32ec7677809b4a433b9da0403080df9837b9e6a5cb6a2482dfc88038a3f3
-
Filesize
714KB
MD5fcb65f753387e57c4d8f66d73a3e96d4
SHA1a40cfb74fc5f28149cd8c6ca92e6d7f975c44f0c
SHA2562754318f278869ee193192df55baee089b6283984b2e108d17508efaf013108d
SHA51244f5c58c14c4e80879ece5ede263bf418ecdcc73f6661db4c4c8bcd553442c69654f32ec7677809b4a433b9da0403080df9837b9e6a5cb6a2482dfc88038a3f3
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD55a2e4a91c86c631b1391f26ff90074bf
SHA108707e1dee6d425c319b6708e3e4d3866b23d803
SHA2569cc637beab383ee15c69491b294fa3b36b59ef211a5a07bec6b09e0ca7ea90ba
SHA512672db92574570e1b16c0ff30f7202002abe25ed2ceffa12c5343c99dff37beb533a3b9e5adbeebd96c3b52851de2096b522ded30ca56a75d0dce2ba48b50f9cd
-
Filesize
714KB
MD55a2e4a91c86c631b1391f26ff90074bf
SHA108707e1dee6d425c319b6708e3e4d3866b23d803
SHA2569cc637beab383ee15c69491b294fa3b36b59ef211a5a07bec6b09e0ca7ea90ba
SHA512672db92574570e1b16c0ff30f7202002abe25ed2ceffa12c5343c99dff37beb533a3b9e5adbeebd96c3b52851de2096b522ded30ca56a75d0dce2ba48b50f9cd
-
Filesize
714KB
MD55a2e4a91c86c631b1391f26ff90074bf
SHA108707e1dee6d425c319b6708e3e4d3866b23d803
SHA2569cc637beab383ee15c69491b294fa3b36b59ef211a5a07bec6b09e0ca7ea90ba
SHA512672db92574570e1b16c0ff30f7202002abe25ed2ceffa12c5343c99dff37beb533a3b9e5adbeebd96c3b52851de2096b522ded30ca56a75d0dce2ba48b50f9cd
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
6KB
MD559513752b20c9e3510db31c99dfc5c60
SHA1cbfd0cd3f52fee958f730d8d31b2372370bf26f3
SHA2564cb21f95bccd80bca6baa955d8f9dcc1837e5a561d1585c9aaecdd7d377db8ab
SHA51208479b2361a3b3d6a80d47260442718a7ce0f72547471b2b674aefa3dbeed7fa012df9c37efae73d729cf973f579672ca996a48552359ecc1fb2b4b32eeeb560
-
Filesize
6KB
MD559513752b20c9e3510db31c99dfc5c60
SHA1cbfd0cd3f52fee958f730d8d31b2372370bf26f3
SHA2564cb21f95bccd80bca6baa955d8f9dcc1837e5a561d1585c9aaecdd7d377db8ab
SHA51208479b2361a3b3d6a80d47260442718a7ce0f72547471b2b674aefa3dbeed7fa012df9c37efae73d729cf973f579672ca996a48552359ecc1fb2b4b32eeeb560
-
Filesize
6KB
MD559513752b20c9e3510db31c99dfc5c60
SHA1cbfd0cd3f52fee958f730d8d31b2372370bf26f3
SHA2564cb21f95bccd80bca6baa955d8f9dcc1837e5a561d1585c9aaecdd7d377db8ab
SHA51208479b2361a3b3d6a80d47260442718a7ce0f72547471b2b674aefa3dbeed7fa012df9c37efae73d729cf973f579672ca996a48552359ecc1fb2b4b32eeeb560
-
Filesize
6KB
MD559513752b20c9e3510db31c99dfc5c60
SHA1cbfd0cd3f52fee958f730d8d31b2372370bf26f3
SHA2564cb21f95bccd80bca6baa955d8f9dcc1837e5a561d1585c9aaecdd7d377db8ab
SHA51208479b2361a3b3d6a80d47260442718a7ce0f72547471b2b674aefa3dbeed7fa012df9c37efae73d729cf973f579672ca996a48552359ecc1fb2b4b32eeeb560
-
Filesize
6KB
MD559513752b20c9e3510db31c99dfc5c60
SHA1cbfd0cd3f52fee958f730d8d31b2372370bf26f3
SHA2564cb21f95bccd80bca6baa955d8f9dcc1837e5a561d1585c9aaecdd7d377db8ab
SHA51208479b2361a3b3d6a80d47260442718a7ce0f72547471b2b674aefa3dbeed7fa012df9c37efae73d729cf973f579672ca996a48552359ecc1fb2b4b32eeeb560
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\f64ed41b4c790d677b42cfb15d501609c6a3c4d769e9fcccbb9ba51e2e135237HOUK
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD529bc902f0d380e7d3863f556b1c081aa
SHA1251579cb47e55c238af037d1efb40d3f6005b396
SHA25644d31ddf4d4e19aca0a91256ccdb60adc6d98daae01ffb99ac1d77c37ee039f2
SHA5123aa9b0a37892d84a0364545495cb1e6a9fae6cc58b410bf29ee122b5af40004fb6502458234489791e11118916abbb63236f6be0823a3b9b4738bdc1211bc091
-
Filesize
714KB
MD529bc902f0d380e7d3863f556b1c081aa
SHA1251579cb47e55c238af037d1efb40d3f6005b396
SHA25644d31ddf4d4e19aca0a91256ccdb60adc6d98daae01ffb99ac1d77c37ee039f2
SHA5123aa9b0a37892d84a0364545495cb1e6a9fae6cc58b410bf29ee122b5af40004fb6502458234489791e11118916abbb63236f6be0823a3b9b4738bdc1211bc091
-
Filesize
714KB
MD529bc902f0d380e7d3863f556b1c081aa
SHA1251579cb47e55c238af037d1efb40d3f6005b396
SHA25644d31ddf4d4e19aca0a91256ccdb60adc6d98daae01ffb99ac1d77c37ee039f2
SHA5123aa9b0a37892d84a0364545495cb1e6a9fae6cc58b410bf29ee122b5af40004fb6502458234489791e11118916abbb63236f6be0823a3b9b4738bdc1211bc091
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232