Analysis
-
max time kernel
75s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe
Resource
win10v2004-20220901-en
General
-
Target
b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe
-
Size
725KB
-
MD5
4185a0ebac66be79ea4863e74e8eaa90
-
SHA1
4dd1b7433c780cb6eee66f2776ee91ced30f55e3
-
SHA256
b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e
-
SHA512
25a78e51494d33341c1fbe9faa26ef76bbaff545bb920ad069a316d78c05de47fa2528248a78473aefa22f5c7e7d0a52b7eadd94dc0de05c7a497bda48a4b7af
-
SSDEEP
12288:sExXoG/3F0nLUlPIpTta7e/NU/3PwoNF7abOgHtkGG64Kg2o7ZmZcc1geFpBnKAP:sEx4e0YlItayK3fn70TKGG6PgEcXebJz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\bmkAcwIc\\CCAwcgwc.exe," b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\bmkAcwIc\\CCAwcgwc.exe," b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 6 IoCs
pid Process 2164 GagwkEoE.exe 3784 CCAwcgwc.exe 4864 fksMAkwk.exe 1820 GagwkEoE.exe 3276 CCAwcgwc.exe 2664 fksMAkwk.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CCAwcgwc.exe = "C:\\ProgramData\\bmkAcwIc\\CCAwcgwc.exe" fksMAkwk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GagwkEoE.exe = "C:\\Users\\Admin\\uEUUEEYg\\GagwkEoE.exe" b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CCAwcgwc.exe = "C:\\ProgramData\\bmkAcwIc\\CCAwcgwc.exe" b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CCAwcgwc.exe = "C:\\ProgramData\\bmkAcwIc\\CCAwcgwc.exe" CCAwcgwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GagwkEoE.exe = "C:\\Users\\Admin\\uEUUEEYg\\GagwkEoE.exe" GagwkEoE.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\uEUUEEYg\GagwkEoE fksMAkwk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\uEUUEEYg fksMAkwk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 30 IoCs
pid Process 4500 reg.exe 4248 reg.exe 1972 reg.exe 1932 reg.exe 2112 reg.exe 3424 reg.exe 2484 reg.exe 1116 reg.exe 4860 reg.exe 1888 reg.exe 1664 reg.exe 1756 reg.exe 4528 reg.exe 3652 reg.exe 3452 reg.exe 956 reg.exe 3704 reg.exe 2160 reg.exe 1756 reg.exe 5032 reg.exe 2468 reg.exe 516 reg.exe 1484 reg.exe 3856 reg.exe 3380 reg.exe 4476 reg.exe 2404 reg.exe 4556 reg.exe 280 reg.exe 5092 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3844 vssvc.exe Token: SeRestorePrivilege 3844 vssvc.exe Token: SeAuditPrivilege 3844 vssvc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4380 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 81 PID 3980 wrote to memory of 4380 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 81 PID 3980 wrote to memory of 4380 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 81 PID 3980 wrote to memory of 2164 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 84 PID 3980 wrote to memory of 2164 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 84 PID 3980 wrote to memory of 2164 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 84 PID 3980 wrote to memory of 3784 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 86 PID 3980 wrote to memory of 3784 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 86 PID 3980 wrote to memory of 3784 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 86 PID 2164 wrote to memory of 1820 2164 GagwkEoE.exe 88 PID 2164 wrote to memory of 1820 2164 GagwkEoE.exe 88 PID 2164 wrote to memory of 1820 2164 GagwkEoE.exe 88 PID 3784 wrote to memory of 3276 3784 CCAwcgwc.exe 89 PID 3784 wrote to memory of 3276 3784 CCAwcgwc.exe 89 PID 3784 wrote to memory of 3276 3784 CCAwcgwc.exe 89 PID 4864 wrote to memory of 2664 4864 fksMAkwk.exe 90 PID 4864 wrote to memory of 2664 4864 fksMAkwk.exe 90 PID 4864 wrote to memory of 2664 4864 fksMAkwk.exe 90 PID 3980 wrote to memory of 4216 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 92 PID 3980 wrote to memory of 4216 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 92 PID 3980 wrote to memory of 4216 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 92 PID 4216 wrote to memory of 4028 4216 cmd.exe 94 PID 4216 wrote to memory of 4028 4216 cmd.exe 94 PID 4216 wrote to memory of 4028 4216 cmd.exe 94 PID 3980 wrote to memory of 1888 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 95 PID 3980 wrote to memory of 1888 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 95 PID 3980 wrote to memory of 1888 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 95 PID 3980 wrote to memory of 2484 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 100 PID 3980 wrote to memory of 2484 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 100 PID 3980 wrote to memory of 2484 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 100 PID 3980 wrote to memory of 956 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 99 PID 3980 wrote to memory of 956 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 99 PID 3980 wrote to memory of 956 3980 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 99 PID 4028 wrote to memory of 680 4028 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 104 PID 4028 wrote to memory of 680 4028 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 104 PID 4028 wrote to memory of 680 4028 b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe"C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR2⤵PID:4380
-
-
C:\Users\Admin\uEUUEEYg\GagwkEoE.exe"C:\Users\Admin\uEUUEEYg\GagwkEoE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\uEUUEEYg\GagwkEoE.exeSWYM3⤵
- Executes dropped EXE
PID:1820
-
-
-
C:\ProgramData\bmkAcwIc\CCAwcgwc.exe"C:\ProgramData\bmkAcwIc\CCAwcgwc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\ProgramData\bmkAcwIc\CCAwcgwc.exeRTHB3⤵
- Executes dropped EXE
PID:3276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e3⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR4⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"4⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e5⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR6⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"6⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e7⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR8⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"8⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e9⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR10⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"10⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e11⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR12⤵PID:632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"12⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e13⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR14⤵PID:1180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"14⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e15⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR16⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"16⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e17⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR18⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"18⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e19⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR20⤵PID:4256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e"20⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeC:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e21⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475e.exeLQIR22⤵PID:4400
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
PID:1756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
PID:1484
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
PID:5092
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
PID:516
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:280
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
PID:3424
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies registry key
PID:3380
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:3452
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
PID:1932
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
PID:4528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:3856
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:3652
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
PID:4860
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
PID:4556
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:1664
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
PID:2404
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:4248
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
PID:1972
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:4500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:5032
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:2468
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:2160
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:4476
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:1756
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:3704
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:2112
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1888
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2484
-
-
C:\ProgramData\fMkAcMwA\fksMAkwk.exeC:\ProgramData\fMkAcMwA\fksMAkwk.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\ProgramData\fMkAcMwA\fksMAkwk.exeTUKF2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD5427a8505fc268bffb46da8514d17acef
SHA10a4d896ad618f2eb493626fcbc131a2a57ab37b2
SHA2569118e7c2eec271f544a5b1ca5dc4e385ecb8d2a257293fe9ad760ec82501b826
SHA512569aebf175e8a8e967aff688a8b07beb5f558d66c3fc34b1c28eaa6c478a194254bbfc9d808effd407cf1d8c7bf1dcdf8f0bf04092614a9b3608deeed95239d7
-
Filesize
715KB
MD5427a8505fc268bffb46da8514d17acef
SHA10a4d896ad618f2eb493626fcbc131a2a57ab37b2
SHA2569118e7c2eec271f544a5b1ca5dc4e385ecb8d2a257293fe9ad760ec82501b826
SHA512569aebf175e8a8e967aff688a8b07beb5f558d66c3fc34b1c28eaa6c478a194254bbfc9d808effd407cf1d8c7bf1dcdf8f0bf04092614a9b3608deeed95239d7
-
Filesize
715KB
MD5427a8505fc268bffb46da8514d17acef
SHA10a4d896ad618f2eb493626fcbc131a2a57ab37b2
SHA2569118e7c2eec271f544a5b1ca5dc4e385ecb8d2a257293fe9ad760ec82501b826
SHA512569aebf175e8a8e967aff688a8b07beb5f558d66c3fc34b1c28eaa6c478a194254bbfc9d808effd407cf1d8c7bf1dcdf8f0bf04092614a9b3608deeed95239d7
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD5fd83d100f38100f6971127950935f80f
SHA15e8ef1e6622f9e0e0e293a332dc9914c1d93db05
SHA256fa6dae018720699b02ecd2cee2a8425ad78ca3bb6632d0cc3a57a175d44e7796
SHA512779d84d10ac6807e7f910e730c7b6f50a3b96102caef56c7dd2cb8655c86e87245306fd1a9b610244407ac09b6fda42094a5a3e2b198e3ba8d7642196dd82eb4
-
Filesize
714KB
MD5fd83d100f38100f6971127950935f80f
SHA15e8ef1e6622f9e0e0e293a332dc9914c1d93db05
SHA256fa6dae018720699b02ecd2cee2a8425ad78ca3bb6632d0cc3a57a175d44e7796
SHA512779d84d10ac6807e7f910e730c7b6f50a3b96102caef56c7dd2cb8655c86e87245306fd1a9b610244407ac09b6fda42094a5a3e2b198e3ba8d7642196dd82eb4
-
Filesize
714KB
MD5fd83d100f38100f6971127950935f80f
SHA15e8ef1e6622f9e0e0e293a332dc9914c1d93db05
SHA256fa6dae018720699b02ecd2cee2a8425ad78ca3bb6632d0cc3a57a175d44e7796
SHA512779d84d10ac6807e7f910e730c7b6f50a3b96102caef56c7dd2cb8655c86e87245306fd1a9b610244407ac09b6fda42094a5a3e2b198e3ba8d7642196dd82eb4
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
Filesize
6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\b053532e2d9b12521c35bc62441e5280ecc7376676e53e2cb10450f3df97475eLQIR
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD5764a3f67c5ba2ed0391d734def8acab0
SHA1972e52452f9b0154248ca57465cd5153c43689d4
SHA2568a7eddb76fd3a413b2151e30e63abd9dda74957430f4cc7dce622933b9d0da7f
SHA51232b67c3828725714ac0089668bfdcd2c70616ba968f1969f686d7d1bfa313dd75c11baff70f49d2f209c41bf3f610ae819d124a465e80d66f5ad60a8549b2f04
-
Filesize
714KB
MD5764a3f67c5ba2ed0391d734def8acab0
SHA1972e52452f9b0154248ca57465cd5153c43689d4
SHA2568a7eddb76fd3a413b2151e30e63abd9dda74957430f4cc7dce622933b9d0da7f
SHA51232b67c3828725714ac0089668bfdcd2c70616ba968f1969f686d7d1bfa313dd75c11baff70f49d2f209c41bf3f610ae819d124a465e80d66f5ad60a8549b2f04
-
Filesize
714KB
MD5764a3f67c5ba2ed0391d734def8acab0
SHA1972e52452f9b0154248ca57465cd5153c43689d4
SHA2568a7eddb76fd3a413b2151e30e63abd9dda74957430f4cc7dce622933b9d0da7f
SHA51232b67c3828725714ac0089668bfdcd2c70616ba968f1969f686d7d1bfa313dd75c11baff70f49d2f209c41bf3f610ae819d124a465e80d66f5ad60a8549b2f04
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232