Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe
Resource
win10v2004-20220812-en
General
-
Target
18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe
-
Size
445KB
-
MD5
67e92c30a2f6e1d7558d9aa3669e3be0
-
SHA1
da3557cccb93727aaec8b6172368bf558cb4a20d
-
SHA256
18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4
-
SHA512
28f46d1ac9c9a35761cd75597f5342c0bec19f6ae3f71bee9f159a02803051d8b544e687b6f77e5cf2ffb4055a74074d84805bde9871d74fd8fa0e48eef74905
-
SSDEEP
12288:3xfhCD+TXbiop8VssEDqKF78vVl+KB1wwQrME+:3bxm3swK2dMI1wwGL+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4804 nSAwEccE.exe 4684 aocYckcs.exe 1744 xSMYQIQM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation nSAwEccE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aocYckcs.exe = "C:\\ProgramData\\XcAkYQQg\\aocYckcs.exe" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nSAwEccE.exe = "C:\\Users\\Admin\\ISUQkgIc\\nSAwEccE.exe" nSAwEccE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aocYckcs.exe = "C:\\ProgramData\\XcAkYQQg\\aocYckcs.exe" aocYckcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aocYckcs.exe = "C:\\ProgramData\\XcAkYQQg\\aocYckcs.exe" xSMYQIQM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nSAwEccE.exe = "C:\\Users\\Admin\\ISUQkgIc\\nSAwEccE.exe" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\ISUQkgIc\nSAwEccE xSMYQIQM.exe File created C:\Windows\SysWOW64\shell32.dll.exe nSAwEccE.exe File opened for modification C:\Windows\SysWOW64\sheExportWait.png nSAwEccE.exe File opened for modification C:\Windows\SysWOW64\sheFormatConfirm.png nSAwEccE.exe File opened for modification C:\Windows\SysWOW64\sheHideGrant.mp3 nSAwEccE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\ISUQkgIc xSMYQIQM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2724 reg.exe 4928 reg.exe 3236 reg.exe 3436 reg.exe 536 reg.exe 4212 reg.exe 1392 reg.exe 2128 reg.exe 3672 reg.exe 3360 reg.exe 4268 reg.exe 4332 reg.exe 1200 reg.exe 312 reg.exe 4228 reg.exe 4124 reg.exe 4192 reg.exe 1472 reg.exe 3192 reg.exe 944 reg.exe 5080 reg.exe 1992 reg.exe 4984 reg.exe 2312 reg.exe 5004 reg.exe 4540 reg.exe 5080 reg.exe 2592 reg.exe 1404 reg.exe 4136 reg.exe 4072 reg.exe 4560 reg.exe 4060 reg.exe 3672 reg.exe 1588 reg.exe 2380 reg.exe 1108 reg.exe 4724 reg.exe 3452 reg.exe 4336 reg.exe 2424 reg.exe 4344 reg.exe 4280 reg.exe 4192 reg.exe 2244 reg.exe 4936 reg.exe 2948 reg.exe 4396 reg.exe 3136 reg.exe 1440 reg.exe 2684 reg.exe 232 reg.exe 1588 reg.exe 1572 reg.exe 4972 reg.exe 2156 reg.exe 4592 reg.exe 2968 reg.exe 520 reg.exe 5036 reg.exe 1920 reg.exe 4188 reg.exe 4056 reg.exe 3936 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4592 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4592 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4592 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4592 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3248 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3248 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3248 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3248 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1496 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1496 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1496 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1496 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2684 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2684 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2684 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2684 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2228 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2228 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2228 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2228 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1400 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1400 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1400 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1400 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 784 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 784 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 784 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 784 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4864 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4864 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4864 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 4864 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 660 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 660 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 660 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 660 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2992 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2992 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2992 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 2992 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3972 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3972 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3972 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 3972 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 832 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 832 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 832 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 832 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1232 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1232 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1232 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 1232 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4804 nSAwEccE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe 4804 nSAwEccE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4804 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 82 PID 2268 wrote to memory of 4804 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 82 PID 2268 wrote to memory of 4804 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 82 PID 2268 wrote to memory of 4684 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 83 PID 2268 wrote to memory of 4684 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 83 PID 2268 wrote to memory of 4684 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 83 PID 2268 wrote to memory of 4852 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 85 PID 2268 wrote to memory of 4852 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 85 PID 2268 wrote to memory of 4852 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 85 PID 2268 wrote to memory of 4936 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 87 PID 2268 wrote to memory of 4936 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 87 PID 2268 wrote to memory of 4936 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 87 PID 2268 wrote to memory of 1028 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 93 PID 2268 wrote to memory of 1028 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 93 PID 2268 wrote to memory of 1028 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 93 PID 2268 wrote to memory of 1388 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 91 PID 2268 wrote to memory of 1388 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 91 PID 2268 wrote to memory of 1388 2268 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 91 PID 4852 wrote to memory of 5076 4852 cmd.exe 90 PID 4852 wrote to memory of 5076 4852 cmd.exe 90 PID 4852 wrote to memory of 5076 4852 cmd.exe 90 PID 5076 wrote to memory of 3212 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 94 PID 5076 wrote to memory of 3212 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 94 PID 5076 wrote to memory of 3212 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 94 PID 5076 wrote to memory of 4132 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 96 PID 5076 wrote to memory of 4132 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 96 PID 5076 wrote to memory of 4132 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 96 PID 3212 wrote to memory of 4264 3212 cmd.exe 99 PID 3212 wrote to memory of 4264 3212 cmd.exe 99 PID 3212 wrote to memory of 4264 3212 cmd.exe 99 PID 5076 wrote to memory of 4124 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 98 PID 5076 wrote to memory of 4124 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 98 PID 5076 wrote to memory of 4124 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 98 PID 5076 wrote to memory of 884 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 100 PID 5076 wrote to memory of 884 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 100 PID 5076 wrote to memory of 884 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 100 PID 5076 wrote to memory of 4064 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 102 PID 5076 wrote to memory of 4064 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 102 PID 5076 wrote to memory of 4064 5076 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 102 PID 4264 wrote to memory of 4284 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 105 PID 4264 wrote to memory of 4284 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 105 PID 4264 wrote to memory of 4284 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 105 PID 4264 wrote to memory of 832 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 107 PID 4264 wrote to memory of 832 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 107 PID 4264 wrote to memory of 832 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 107 PID 4264 wrote to memory of 3936 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 115 PID 4264 wrote to memory of 3936 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 115 PID 4264 wrote to memory of 3936 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 115 PID 4264 wrote to memory of 3432 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 108 PID 4264 wrote to memory of 3432 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 108 PID 4264 wrote to memory of 3432 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 108 PID 4264 wrote to memory of 4016 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 110 PID 4264 wrote to memory of 4016 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 110 PID 4264 wrote to memory of 4016 4264 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 110 PID 4064 wrote to memory of 3484 4064 cmd.exe 113 PID 4064 wrote to memory of 3484 4064 cmd.exe 113 PID 4064 wrote to memory of 3484 4064 cmd.exe 113 PID 4284 wrote to memory of 4592 4284 cmd.exe 116 PID 4284 wrote to memory of 4592 4284 cmd.exe 116 PID 4284 wrote to memory of 4592 4284 cmd.exe 116 PID 4016 wrote to memory of 4396 4016 cmd.exe 117 PID 4016 wrote to memory of 4396 4016 cmd.exe 117 PID 4016 wrote to memory of 4396 4016 cmd.exe 117 PID 4592 wrote to memory of 2116 4592 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe 119 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe"C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\ISUQkgIc\nSAwEccE.exe"C:\Users\Admin\ISUQkgIc\nSAwEccE.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4804
-
-
C:\ProgramData\XcAkYQQg\aocYckcs.exe"C:\ProgramData\XcAkYQQg\aocYckcs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b43⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"4⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b45⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"6⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b47⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"8⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b49⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"10⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b411⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"12⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b413⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"14⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b415⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"16⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b417⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"18⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b419⤵
- Suspicious behavior: EnumeratesProcesses
PID:784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"20⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b421⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"22⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b423⤵
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"24⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b425⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"26⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b427⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"28⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b429⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"30⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b431⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"32⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b433⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"34⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b435⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"36⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b437⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"38⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b439⤵PID:860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"40⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b441⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"42⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b443⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"44⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b445⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"46⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b447⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"48⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b449⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"50⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b451⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"52⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b453⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"54⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b455⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"56⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b457⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"58⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b459⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"60⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b461⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"62⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b463⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"64⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b465⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"66⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b467⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"68⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b469⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"70⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b471⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"72⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b473⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"74⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b475⤵
- Modifies visibility of file extensions in Explorer
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"76⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b477⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"78⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b479⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"80⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b481⤵PID:2028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"82⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b483⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"84⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b485⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"86⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b487⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"88⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b489⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"90⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b491⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"92⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b493⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"94⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b495⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"96⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b497⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"98⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b499⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"100⤵PID:3176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4101⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"102⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4103⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"104⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4105⤵PID:1476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"106⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4107⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"108⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4109⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"110⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4111⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"112⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4113⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"114⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4115⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"116⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4117⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"118⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4119⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"120⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4.exeC:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4121⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\18fee22908ee54a524e1682b27af400d82b673e4a1e5e1b12f285bcb114d59b4"122⤵PID:3508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-