Analysis
-
max time kernel
12s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe
Resource
win10v2004-20220812-en
General
-
Target
a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe
-
Size
726KB
-
MD5
a19cb66b2f1f21abde621ec75318bcc0
-
SHA1
6a678d3b7a5a02cba28a86773036b59f9282a3ab
-
SHA256
a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf
-
SHA512
7b8bba792ac027f4e7048d2a849044e38b683d9af9eac1f5cdebab3695457ece89e57f160b6a89030cb2eb70b3e05501ad1e73a265b156f955e62a05fec7e583
-
SSDEEP
12288:e89Vgo/vla6+iH0ZpD0s0CwZP/p0yzd3BNJDRAkqwBf9dOI8FODIltJmvct:j/ggvwzN0s0h50srNVRAktfTOI8FO6m8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\zckIEwgI\\YsMcUwoM.exe," a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\zckIEwgI\\YsMcUwoM.exe," a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe -
Executes dropped EXE 6 IoCs
pid Process 2232 LCUoUowQ.exe 4060 YsMcUwoM.exe 2800 wUwIwYEk.exe 852 YsMcUwoM.exe 4544 wUwIwYEk.exe 4540 LCUoUowQ.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LCUoUowQ.exe = "C:\\Users\\Admin\\xCUUwsEk\\LCUoUowQ.exe" a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YsMcUwoM.exe = "C:\\ProgramData\\zckIEwgI\\YsMcUwoM.exe" a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe -
Modifies registry key 1 TTPs 33 IoCs
pid Process 3652 reg.exe 3248 reg.exe 2304 reg.exe 1292 reg.exe 3604 reg.exe 4952 reg.exe 3044 reg.exe 2268 reg.exe 3712 reg.exe 3648 reg.exe 1524 reg.exe 3188 reg.exe 1712 reg.exe 616 reg.exe 1052 reg.exe 5032 reg.exe 4796 reg.exe 3384 reg.exe 372 reg.exe 4784 reg.exe 1788 reg.exe 4116 reg.exe 1288 reg.exe 3356 reg.exe 4404 reg.exe 4312 reg.exe 3332 reg.exe 4196 reg.exe 3108 reg.exe 2240 reg.exe 2284 reg.exe 4280 reg.exe 4484 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1584 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 81 PID 4884 wrote to memory of 1584 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 81 PID 4884 wrote to memory of 1584 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 81 PID 4884 wrote to memory of 2232 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 83 PID 4884 wrote to memory of 2232 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 83 PID 4884 wrote to memory of 2232 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 83 PID 4884 wrote to memory of 4060 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 82 PID 4884 wrote to memory of 4060 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 82 PID 4884 wrote to memory of 4060 4884 a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe 82 PID 4060 wrote to memory of 852 4060 YsMcUwoM.exe 85 PID 4060 wrote to memory of 852 4060 YsMcUwoM.exe 85 PID 4060 wrote to memory of 852 4060 YsMcUwoM.exe 85 PID 2800 wrote to memory of 4544 2800 wUwIwYEk.exe 86 PID 2800 wrote to memory of 4544 2800 wUwIwYEk.exe 86 PID 2800 wrote to memory of 4544 2800 wUwIwYEk.exe 86 PID 2232 wrote to memory of 4540 2232 LCUoUowQ.exe 87 PID 2232 wrote to memory of 4540 2232 LCUoUowQ.exe 87 PID 2232 wrote to memory of 4540 2232 LCUoUowQ.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe"C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP2⤵PID:1584
-
-
C:\ProgramData\zckIEwgI\YsMcUwoM.exe"C:\ProgramData\zckIEwgI\YsMcUwoM.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\ProgramData\zckIEwgI\YsMcUwoM.exeFNEP3⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\xCUUwsEk\LCUoUowQ.exe"C:\Users\Admin\xCUUwsEk\LCUoUowQ.exe"3⤵PID:4356
-
C:\Users\Admin\xCUUwsEk\LCUoUowQ.exeJPSW4⤵PID:2832
-
-
-
-
C:\Users\Admin\xCUUwsEk\LCUoUowQ.exe"C:\Users\Admin\xCUUwsEk\LCUoUowQ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\xCUUwsEk\LCUoUowQ.exeJPSW3⤵
- Executes dropped EXE
PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"2⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf3⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP4⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"4⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf5⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP6⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"6⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf7⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP8⤵PID:4860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"8⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf9⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP10⤵PID:3868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"10⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf11⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP12⤵PID:3248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"12⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf13⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP14⤵PID:372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"14⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf15⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP16⤵PID:3996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"16⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf17⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP18⤵PID:4200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"18⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf19⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP20⤵PID:3396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf"20⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exeC:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf21⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddf.exePSJP22⤵PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:4484
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies registry key
PID:3384
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
PID:2268
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
PID:1288
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
PID:4312
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
PID:3332
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:3652
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
PID:4116
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies registry key
PID:1788
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:3188
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
PID:1292
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
PID:2304
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:4404
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:4784
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
PID:3356
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
PID:4952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:1052
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
PID:5032
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:616
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
PID:4796
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:2284
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:4280
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:3604
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:372
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:2240
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:1712
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:1524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:4196
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:3108
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3648
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3248
-
-
C:\ProgramData\JAEQIIAc\wUwIwYEk.exeC:\ProgramData\JAEQIIAc\wUwIwYEk.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\ProgramData\JAEQIIAc\wUwIwYEk.exePFAN2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD564d07febb2191e5952c2779d4351eb2c
SHA1e59e550d4d8fd00940d58d0781c7cdc33cd171e8
SHA256db61b1ebc9d522d541038041dff35385763076a5710a252aec76b90f715ba5ce
SHA512099a0bd5a2197c64c982c53e70936abcf25e58241fa3344dd10487f0e29641a863385e51ca0894dc88c49152fca79bfac53ad4aa46e129ef18f95613a29229d4
-
Filesize
715KB
MD564d07febb2191e5952c2779d4351eb2c
SHA1e59e550d4d8fd00940d58d0781c7cdc33cd171e8
SHA256db61b1ebc9d522d541038041dff35385763076a5710a252aec76b90f715ba5ce
SHA512099a0bd5a2197c64c982c53e70936abcf25e58241fa3344dd10487f0e29641a863385e51ca0894dc88c49152fca79bfac53ad4aa46e129ef18f95613a29229d4
-
Filesize
715KB
MD564d07febb2191e5952c2779d4351eb2c
SHA1e59e550d4d8fd00940d58d0781c7cdc33cd171e8
SHA256db61b1ebc9d522d541038041dff35385763076a5710a252aec76b90f715ba5ce
SHA512099a0bd5a2197c64c982c53e70936abcf25e58241fa3344dd10487f0e29641a863385e51ca0894dc88c49152fca79bfac53ad4aa46e129ef18f95613a29229d4
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
713KB
MD5e178565f713aabd05e32eea62e0eb671
SHA163daba04315c4cc4158bcde5d78d5af1982eb174
SHA256fd3394c7e196289a019d05c75bf1ccb5ed8f013c58e2efdf7cbe556eb79731e3
SHA51289da386190d760d1daa1743b4d7cf79a73422580245413fcd9a25825178c590e50a70469351fc070a56642ce85e259f69152becfefdb437f9845b7cdb8bdf74b
-
Filesize
713KB
MD5e178565f713aabd05e32eea62e0eb671
SHA163daba04315c4cc4158bcde5d78d5af1982eb174
SHA256fd3394c7e196289a019d05c75bf1ccb5ed8f013c58e2efdf7cbe556eb79731e3
SHA51289da386190d760d1daa1743b4d7cf79a73422580245413fcd9a25825178c590e50a70469351fc070a56642ce85e259f69152becfefdb437f9845b7cdb8bdf74b
-
Filesize
713KB
MD5e178565f713aabd05e32eea62e0eb671
SHA163daba04315c4cc4158bcde5d78d5af1982eb174
SHA256fd3394c7e196289a019d05c75bf1ccb5ed8f013c58e2efdf7cbe556eb79731e3
SHA51289da386190d760d1daa1743b4d7cf79a73422580245413fcd9a25825178c590e50a70469351fc070a56642ce85e259f69152becfefdb437f9845b7cdb8bdf74b
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\a1010a4d74a7c02ae71187b7d5efd691eaad59770ae4cd9f816017bcf7f48ddfPSJP
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD560dbcbc426241c4dd99d529e533805f3
SHA17206ce642c1668d177df4cdce3108cc8fc318b0a
SHA2562f80d20ecc8f13ae68e4da3f2399f97bac3080dc4a7869e643b7dc5b5ba2a3db
SHA512db968dc9bc96a420652675ff45dea2320673ab39de3a274819b42e441325fdaba0d7fa3a36ea363e71f33c3a0a46df16892428b6d30bb4298181d3d8c9c2a1d9
-
Filesize
714KB
MD560dbcbc426241c4dd99d529e533805f3
SHA17206ce642c1668d177df4cdce3108cc8fc318b0a
SHA2562f80d20ecc8f13ae68e4da3f2399f97bac3080dc4a7869e643b7dc5b5ba2a3db
SHA512db968dc9bc96a420652675ff45dea2320673ab39de3a274819b42e441325fdaba0d7fa3a36ea363e71f33c3a0a46df16892428b6d30bb4298181d3d8c9c2a1d9
-
Filesize
714KB
MD560dbcbc426241c4dd99d529e533805f3
SHA17206ce642c1668d177df4cdce3108cc8fc318b0a
SHA2562f80d20ecc8f13ae68e4da3f2399f97bac3080dc4a7869e643b7dc5b5ba2a3db
SHA512db968dc9bc96a420652675ff45dea2320673ab39de3a274819b42e441325fdaba0d7fa3a36ea363e71f33c3a0a46df16892428b6d30bb4298181d3d8c9c2a1d9
-
Filesize
714KB
MD560dbcbc426241c4dd99d529e533805f3
SHA17206ce642c1668d177df4cdce3108cc8fc318b0a
SHA2562f80d20ecc8f13ae68e4da3f2399f97bac3080dc4a7869e643b7dc5b5ba2a3db
SHA512db968dc9bc96a420652675ff45dea2320673ab39de3a274819b42e441325fdaba0d7fa3a36ea363e71f33c3a0a46df16892428b6d30bb4298181d3d8c9c2a1d9
-
Filesize
714KB
MD560dbcbc426241c4dd99d529e533805f3
SHA17206ce642c1668d177df4cdce3108cc8fc318b0a
SHA2562f80d20ecc8f13ae68e4da3f2399f97bac3080dc4a7869e643b7dc5b5ba2a3db
SHA512db968dc9bc96a420652675ff45dea2320673ab39de3a274819b42e441325fdaba0d7fa3a36ea363e71f33c3a0a46df16892428b6d30bb4298181d3d8c9c2a1d9
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232