Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe
Resource
win10v2004-20220812-en
General
-
Target
a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe
-
Size
538KB
-
MD5
6da893762cb4c1488709caad02f043d0
-
SHA1
a3b3a698892554cb0fc7bbab31aef011264c0a0b
-
SHA256
a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff
-
SHA512
efe6e1f90b7a08d75d7d5ab38d53b303b0ca9680484868fbd4fe1ae75d417a0cc03f375b81ee89ac36d6f6162bb9292686675f55542a1ecead43139e548a9f79
-
SSDEEP
12288:fHCXV0qw3XMpQYj1XacctPWYyOqWCNUyvrL:PJAQYjFaLFWYyN5L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe," a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe," a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe,C:\\ProgramData\\umIkgMkk\\YMYgUsAE.exe," a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe,C:\\ProgramData\\umIkgMkk\\YMYgUsAE.exe," a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1672 PuMcgUYA.exe 1336 xcwAEwoo.exe 952 yqsYggUY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xcwAEwoo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PuMcgUYA.exe = "C:\\Users\\Admin\\dIAEowgU\\PuMcgUYA.exe" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xcwAEwoo.exe = "C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PuMcgUYA.exe = "C:\\Users\\Admin\\dIAEowgU\\PuMcgUYA.exe" PuMcgUYA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xcwAEwoo.exe = "C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe" xcwAEwoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xcwAEwoo.exe = "C:\\ProgramData\\gEcMgMgc\\xcwAEwoo.exe" yqsYggUY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ngEAAIsY.exe = "C:\\Users\\Admin\\JuYQoEYo\\ngEAAIsY.exe" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YMYgUsAE.exe = "C:\\ProgramData\\umIkgMkk\\YMYgUsAE.exe" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe xcwAEwoo.exe File opened for modification C:\Windows\SysWOW64\sheStartUninstall.mpg xcwAEwoo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\dIAEowgU yqsYggUY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\dIAEowgU\PuMcgUYA yqsYggUY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2888 1616 WerFault.exe 765 1936 4352 WerFault.exe 768 2332 4384 WerFault.exe 764 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4288 reg.exe 1888 reg.exe 756 reg.exe 3604 reg.exe 4404 reg.exe 852 reg.exe 1232 reg.exe 4540 reg.exe 1304 reg.exe 4084 reg.exe 3708 reg.exe 1372 reg.exe 32 reg.exe 2616 reg.exe 1180 reg.exe 2680 reg.exe 3908 reg.exe 4620 reg.exe 4772 reg.exe 2156 reg.exe 4844 reg.exe 1600 reg.exe 3692 reg.exe 4804 reg.exe 3632 reg.exe 2628 reg.exe 3960 reg.exe 2132 reg.exe 1988 reg.exe 3960 reg.exe 1432 reg.exe 5052 reg.exe 4176 reg.exe 1300 reg.exe 4584 reg.exe 5104 reg.exe 1984 reg.exe 4992 reg.exe 4528 reg.exe 3620 reg.exe 4976 reg.exe 1932 reg.exe 312 reg.exe 5056 reg.exe 3136 reg.exe 1856 reg.exe 4476 reg.exe 3968 reg.exe 3892 reg.exe 4952 reg.exe 3460 reg.exe 1888 reg.exe 2152 reg.exe 2480 reg.exe 4884 reg.exe 1716 reg.exe 2156 reg.exe 628 reg.exe 4584 reg.exe 3448 reg.exe 4816 reg.exe 4024 reg.exe 1656 reg.exe 4236 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3908 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3908 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3908 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3908 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5008 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5008 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5008 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 5008 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1124 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1124 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1124 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1124 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2616 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2616 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2616 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2616 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2664 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2664 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2664 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 2664 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1296 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1296 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1296 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1296 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4352 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4352 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4352 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4352 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4136 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4136 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4136 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4136 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3940 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3940 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3940 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 3940 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1448 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1448 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1448 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 1448 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4052 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4052 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4052 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 4052 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 756 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 756 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 756 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 756 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1336 xcwAEwoo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe 1336 xcwAEwoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1672 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 84 PID 5084 wrote to memory of 1672 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 84 PID 5084 wrote to memory of 1672 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 84 PID 5084 wrote to memory of 1336 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 85 PID 5084 wrote to memory of 1336 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 85 PID 5084 wrote to memory of 1336 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 85 PID 5084 wrote to memory of 4216 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 87 PID 5084 wrote to memory of 4216 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 87 PID 5084 wrote to memory of 4216 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 87 PID 5084 wrote to memory of 4724 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 89 PID 5084 wrote to memory of 4724 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 89 PID 5084 wrote to memory of 4724 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 89 PID 5084 wrote to memory of 3192 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 90 PID 5084 wrote to memory of 3192 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 90 PID 5084 wrote to memory of 3192 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 90 PID 5084 wrote to memory of 1544 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 94 PID 5084 wrote to memory of 1544 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 94 PID 5084 wrote to memory of 1544 5084 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 94 PID 4216 wrote to memory of 4896 4216 cmd.exe 92 PID 4216 wrote to memory of 4896 4216 cmd.exe 92 PID 4216 wrote to memory of 4896 4216 cmd.exe 92 PID 4896 wrote to memory of 1396 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 96 PID 4896 wrote to memory of 1396 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 96 PID 4896 wrote to memory of 1396 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 96 PID 4896 wrote to memory of 220 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 98 PID 4896 wrote to memory of 220 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 98 PID 4896 wrote to memory of 220 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 98 PID 4896 wrote to memory of 32 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 99 PID 4896 wrote to memory of 32 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 99 PID 4896 wrote to memory of 32 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 99 PID 4896 wrote to memory of 2588 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 101 PID 4896 wrote to memory of 2588 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 101 PID 4896 wrote to memory of 2588 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 101 PID 4896 wrote to memory of 3200 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 103 PID 4896 wrote to memory of 3200 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 103 PID 4896 wrote to memory of 3200 4896 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 103 PID 1396 wrote to memory of 4808 1396 cmd.exe 106 PID 1396 wrote to memory of 4808 1396 cmd.exe 106 PID 1396 wrote to memory of 4808 1396 cmd.exe 106 PID 3200 wrote to memory of 3620 3200 cmd.exe 107 PID 3200 wrote to memory of 3620 3200 cmd.exe 107 PID 3200 wrote to memory of 3620 3200 cmd.exe 107 PID 4808 wrote to memory of 4524 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 108 PID 4808 wrote to memory of 4524 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 108 PID 4808 wrote to memory of 4524 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 108 PID 4524 wrote to memory of 2300 4524 cmd.exe 110 PID 4524 wrote to memory of 2300 4524 cmd.exe 110 PID 4524 wrote to memory of 2300 4524 cmd.exe 110 PID 4808 wrote to memory of 4012 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 111 PID 4808 wrote to memory of 4012 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 111 PID 4808 wrote to memory of 4012 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 111 PID 4808 wrote to memory of 680 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 112 PID 4808 wrote to memory of 680 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 112 PID 4808 wrote to memory of 680 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 112 PID 4808 wrote to memory of 1808 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 114 PID 4808 wrote to memory of 1808 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 114 PID 4808 wrote to memory of 1808 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 114 PID 4808 wrote to memory of 2140 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 116 PID 4808 wrote to memory of 2140 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 116 PID 4808 wrote to memory of 2140 4808 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 116 PID 2300 wrote to memory of 704 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 119 PID 2300 wrote to memory of 704 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 119 PID 2300 wrote to memory of 704 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 119 PID 2300 wrote to memory of 3604 2300 a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe 121 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe"C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\dIAEowgU\PuMcgUYA.exe"C:\Users\Admin\dIAEowgU\PuMcgUYA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1672
-
-
C:\ProgramData\gEcMgMgc\xcwAEwoo.exe"C:\ProgramData\gEcMgMgc\xcwAEwoo.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"6⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"8⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"10⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"12⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"14⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"16⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"18⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"20⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"22⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"24⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"26⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"28⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"30⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff31⤵
- Suspicious behavior: EnumeratesProcesses
PID:756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"32⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff33⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"34⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff35⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"36⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff37⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"38⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff39⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"40⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff41⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"42⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff43⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"44⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff45⤵PID:3904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"46⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff47⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"48⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff49⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yqsYYswY.bat" "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exe""50⤵PID:1632
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:1432
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
PID:2140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"50⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff51⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"52⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff53⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"54⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff55⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"56⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff57⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"58⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff59⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"60⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff61⤵PID:1548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"62⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff63⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"64⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff65⤵PID:680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"66⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff67⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"68⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff69⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"70⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff71⤵PID:2324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"72⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff73⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"74⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff75⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"76⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff77⤵PID:3200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"78⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff79⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"80⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff81⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"82⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff83⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"84⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff85⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"86⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff87⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"88⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff89⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"90⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff91⤵
- Modifies visibility of file extensions in Explorer
PID:312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"92⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff93⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"94⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff95⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"96⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff97⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"98⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff99⤵PID:1676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"100⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff101⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"102⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff103⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"104⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff105⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"106⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff107⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"108⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff109⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"110⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff111⤵PID:1868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"112⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff113⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:2128 -
C:\Users\Admin\JuYQoEYo\ngEAAIsY.exe"C:\Users\Admin\JuYQoEYo\ngEAAIsY.exe"114⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 328115⤵
- Program crash
PID:2332
-
-
-
C:\ProgramData\umIkgMkk\YMYgUsAE.exe"C:\ProgramData\umIkgMkk\YMYgUsAE.exe"114⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 264115⤵
- Program crash
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"114⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff115⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"116⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff117⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"118⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff119⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"120⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff.exeC:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff121⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a01358fe1f0c3c812cdc508cb1c8cd882b8049ce779122db6c058e07e95faeff"122⤵PID:1296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-