Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe
Resource
win10v2004-20220812-en
General
-
Target
6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe
-
Size
726KB
-
MD5
a34723ece540d72a8ed783376e9f7030
-
SHA1
75b1fd929621956332b3ee543848fb11fbbe05a6
-
SHA256
6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c
-
SHA512
1f35de288af10838750f3d57f4b255acd6aeeb995b56d9a93e7394dca11aa9f1e6fae5ae2018313ccc8338723da8eefb758b009d769854360806f04b1d51c773
-
SSDEEP
12288:Tr+K3DCu863yw4lA01u7VsVMz2SgW25jeZ3F7yl8EDpnQj4JuEq:TiKTCYCdBVMKZelFy8ApnQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\BmEoAsQw\\HSUUkscI.exe," 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\BmEoAsQw\\HSUUkscI.exe," 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 8 IoCs
pid Process 4500 fAYMcYQo.exe 2340 HSUUkscI.exe 400 HIAUoUoI.exe 1864 HIAUoUoI.exe 224 HSUUkscI.exe 3840 fAYMcYQo.exe 3412 fAYMcYQo.exe 2344 fAYMcYQo.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HSUUkscI.exe = "C:\\ProgramData\\BmEoAsQw\\HSUUkscI.exe" HSUUkscI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HSUUkscI.exe = "C:\\ProgramData\\BmEoAsQw\\HSUUkscI.exe" HIAUoUoI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fAYMcYQo.exe = "C:\\Users\\Admin\\AmwkUswo\\fAYMcYQo.exe" fAYMcYQo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fAYMcYQo.exe = "C:\\Users\\Admin\\AmwkUswo\\fAYMcYQo.exe" 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HSUUkscI.exe = "C:\\ProgramData\\BmEoAsQw\\HSUUkscI.exe" 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AmwkUswo HIAUoUoI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AmwkUswo\fAYMcYQo HIAUoUoI.exe -
Modifies registry key 1 TTPs 27 IoCs
pid Process 4832 reg.exe 4812 reg.exe 3112 reg.exe 1712 reg.exe 4240 reg.exe 3696 reg.exe 2304 reg.exe 3740 reg.exe 2300 reg.exe 3600 reg.exe 4256 reg.exe 4716 reg.exe 3660 reg.exe 1548 reg.exe 3828 reg.exe 3560 reg.exe 3500 reg.exe 4592 reg.exe 1312 reg.exe 2524 reg.exe 3564 reg.exe 2336 reg.exe 2456 reg.exe 8 reg.exe 1512 reg.exe 5116 reg.exe 368 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 2340 HSUUkscI.exe 2340 HSUUkscI.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 548 wrote to memory of 4468 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 82 PID 548 wrote to memory of 4468 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 82 PID 548 wrote to memory of 4468 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 82 PID 548 wrote to memory of 4500 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 83 PID 548 wrote to memory of 4500 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 83 PID 548 wrote to memory of 4500 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 83 PID 548 wrote to memory of 2340 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 84 PID 548 wrote to memory of 2340 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 84 PID 548 wrote to memory of 2340 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 84 PID 400 wrote to memory of 1864 400 HIAUoUoI.exe 86 PID 400 wrote to memory of 1864 400 HIAUoUoI.exe 86 PID 400 wrote to memory of 1864 400 HIAUoUoI.exe 86 PID 2340 wrote to memory of 224 2340 HSUUkscI.exe 87 PID 2340 wrote to memory of 224 2340 HSUUkscI.exe 87 PID 2340 wrote to memory of 224 2340 HSUUkscI.exe 87 PID 4500 wrote to memory of 3840 4500 fAYMcYQo.exe 88 PID 4500 wrote to memory of 3840 4500 fAYMcYQo.exe 88 PID 4500 wrote to memory of 3840 4500 fAYMcYQo.exe 88 PID 548 wrote to memory of 1924 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 89 PID 548 wrote to memory of 1924 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 89 PID 548 wrote to memory of 1924 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 89 PID 548 wrote to memory of 5116 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 127 PID 548 wrote to memory of 5116 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 127 PID 548 wrote to memory of 5116 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 127 PID 548 wrote to memory of 3696 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 91 PID 548 wrote to memory of 3696 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 91 PID 548 wrote to memory of 3696 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 91 PID 548 wrote to memory of 3564 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 92 PID 548 wrote to memory of 3564 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 92 PID 548 wrote to memory of 3564 548 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 92 PID 2340 wrote to memory of 3412 2340 HSUUkscI.exe 97 PID 2340 wrote to memory of 3412 2340 HSUUkscI.exe 97 PID 2340 wrote to memory of 3412 2340 HSUUkscI.exe 97 PID 1924 wrote to memory of 4388 1924 cmd.exe 98 PID 1924 wrote to memory of 4388 1924 cmd.exe 98 PID 1924 wrote to memory of 4388 1924 cmd.exe 98 PID 3412 wrote to memory of 2344 3412 fAYMcYQo.exe 99 PID 3412 wrote to memory of 2344 3412 fAYMcYQo.exe 99 PID 3412 wrote to memory of 2344 3412 fAYMcYQo.exe 99 PID 4388 wrote to memory of 3860 4388 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 100 PID 4388 wrote to memory of 3860 4388 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 100 PID 4388 wrote to memory of 3860 4388 6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe"C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD2⤵PID:4468
-
-
C:\Users\Admin\AmwkUswo\fAYMcYQo.exe"C:\Users\Admin\AmwkUswo\fAYMcYQo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AmwkUswo\fAYMcYQo.exeKSJC3⤵
- Executes dropped EXE
PID:3840
-
-
-
C:\ProgramData\BmEoAsQw\HSUUkscI.exe"C:\ProgramData\BmEoAsQw\HSUUkscI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\ProgramData\BmEoAsQw\HSUUkscI.exeLQVI3⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AmwkUswo\fAYMcYQo.exe"C:\Users\Admin\AmwkUswo\fAYMcYQo.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AmwkUswo\fAYMcYQo.exeKSJC4⤵
- Executes dropped EXE
PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c3⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD4⤵PID:3860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"4⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c5⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD6⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"6⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c7⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD8⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"8⤵PID:4532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Modifies visibility of file extensions in Explorer
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c9⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD10⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"10⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c11⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD12⤵PID:764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"12⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c13⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD14⤵PID:4492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"14⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c15⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD16⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c"16⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeC:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c17⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442c.exeIRGD18⤵PID:4980
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
PID:3600
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:1512
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
PID:2524
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies registry key
PID:4592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:2456
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
PID:8
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
PID:1312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:3112
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:3500
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
PID:368
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:2300
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
PID:3828
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:3740
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
PID:4812
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:4832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:2336
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:3660
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:4240
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:3560
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:4256
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:2304
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:4716
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:5116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3696
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:3564
-
-
C:\ProgramData\pqogMMkw\HIAUoUoI.exeC:\ProgramData\pqogMMkw\HIAUoUoI.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:400 -
C:\ProgramData\pqogMMkw\HIAUoUoI.exeHBYZ2⤵
- Executes dropped EXE
PID:1864
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
714KB
MD541ba116b44976f25df7e200bbb587284
SHA105233c3173452ee790d1ae51686121daa09ada37
SHA256d6d2efcb7a2f86932c0403ff1438c36788e20efaf95341d95073d1a0557dd5e8
SHA5121a47d9dee77c84cc0542107a82723ceb52d52c75dc14170804806cb62ef86c695927acd3fd8aa98709da0e0971c2348698e1ec508f5a3a1060891ad692f9d820
-
Filesize
714KB
MD541ba116b44976f25df7e200bbb587284
SHA105233c3173452ee790d1ae51686121daa09ada37
SHA256d6d2efcb7a2f86932c0403ff1438c36788e20efaf95341d95073d1a0557dd5e8
SHA5121a47d9dee77c84cc0542107a82723ceb52d52c75dc14170804806cb62ef86c695927acd3fd8aa98709da0e0971c2348698e1ec508f5a3a1060891ad692f9d820
-
Filesize
714KB
MD541ba116b44976f25df7e200bbb587284
SHA105233c3173452ee790d1ae51686121daa09ada37
SHA256d6d2efcb7a2f86932c0403ff1438c36788e20efaf95341d95073d1a0557dd5e8
SHA5121a47d9dee77c84cc0542107a82723ceb52d52c75dc14170804806cb62ef86c695927acd3fd8aa98709da0e0971c2348698e1ec508f5a3a1060891ad692f9d820
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
715KB
MD506d2ccdaf1f477603cd5f17a4b5237e0
SHA1519cdac70fdf0c411d18fdd324dbd789ff75f69b
SHA256506940afaa6cec17f2e274be23cd1e405530624563bc66a2727a498e1ea263f9
SHA5123456bb44ff3a05ed70e1b94ffbe0098c6ac51296e69ab43fce509ff0b48faeeb7ac70cfc9067f365ac7db603cdcb5bc119b72c0a0de4b179a536a0b032ab60ae
-
Filesize
715KB
MD506d2ccdaf1f477603cd5f17a4b5237e0
SHA1519cdac70fdf0c411d18fdd324dbd789ff75f69b
SHA256506940afaa6cec17f2e274be23cd1e405530624563bc66a2727a498e1ea263f9
SHA5123456bb44ff3a05ed70e1b94ffbe0098c6ac51296e69ab43fce509ff0b48faeeb7ac70cfc9067f365ac7db603cdcb5bc119b72c0a0de4b179a536a0b032ab60ae
-
Filesize
715KB
MD506d2ccdaf1f477603cd5f17a4b5237e0
SHA1519cdac70fdf0c411d18fdd324dbd789ff75f69b
SHA256506940afaa6cec17f2e274be23cd1e405530624563bc66a2727a498e1ea263f9
SHA5123456bb44ff3a05ed70e1b94ffbe0098c6ac51296e69ab43fce509ff0b48faeeb7ac70cfc9067f365ac7db603cdcb5bc119b72c0a0de4b179a536a0b032ab60ae
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
714KB
MD5e8a80d176130382984a93c6058ca6c9b
SHA10886d0ce86025616afd3f5230aec0de8ed49bebb
SHA25669d111e2b10ceb57f30050ac47f811d8585b06981d33c506eec4385040b19e55
SHA512dadaeada28f6108484d905c9015ed8c21d410ba53798b352a5ecca2fa41fb60570c7183c38db9c84a184e637779fbf5f4726feb7b0cddc6cb837fa75e23b9f37
-
Filesize
714KB
MD5e8a80d176130382984a93c6058ca6c9b
SHA10886d0ce86025616afd3f5230aec0de8ed49bebb
SHA25669d111e2b10ceb57f30050ac47f811d8585b06981d33c506eec4385040b19e55
SHA512dadaeada28f6108484d905c9015ed8c21d410ba53798b352a5ecca2fa41fb60570c7183c38db9c84a184e637779fbf5f4726feb7b0cddc6cb837fa75e23b9f37
-
Filesize
714KB
MD5e8a80d176130382984a93c6058ca6c9b
SHA10886d0ce86025616afd3f5230aec0de8ed49bebb
SHA25669d111e2b10ceb57f30050ac47f811d8585b06981d33c506eec4385040b19e55
SHA512dadaeada28f6108484d905c9015ed8c21d410ba53798b352a5ecca2fa41fb60570c7183c38db9c84a184e637779fbf5f4726feb7b0cddc6cb837fa75e23b9f37
-
Filesize
714KB
MD5e8a80d176130382984a93c6058ca6c9b
SHA10886d0ce86025616afd3f5230aec0de8ed49bebb
SHA25669d111e2b10ceb57f30050ac47f811d8585b06981d33c506eec4385040b19e55
SHA512dadaeada28f6108484d905c9015ed8c21d410ba53798b352a5ecca2fa41fb60570c7183c38db9c84a184e637779fbf5f4726feb7b0cddc6cb837fa75e23b9f37
-
Filesize
714KB
MD5e8a80d176130382984a93c6058ca6c9b
SHA10886d0ce86025616afd3f5230aec0de8ed49bebb
SHA25669d111e2b10ceb57f30050ac47f811d8585b06981d33c506eec4385040b19e55
SHA512dadaeada28f6108484d905c9015ed8c21d410ba53798b352a5ecca2fa41fb60570c7183c38db9c84a184e637779fbf5f4726feb7b0cddc6cb837fa75e23b9f37
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
Filesize
6KB
MD5672a1f1de82c3076688c129d2c89d0e2
SHA102e8f06ad6888c9fb28059f5eac065b7bbfdd365
SHA2561d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363
SHA512e2a10f2636cad8f3fe790d68454b929831a0d0b23b1a8714188ac23df2d4af4ff134650050cc1bc9ce870d5200c7b5da41b18fc1a300a86556049879af78fb90
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232
-
C:\Users\Admin\AppData\Local\Temp\6d23398a27a09e01c1a97377224c6090249b01d72dd1040fd7094a313292442cIRGD
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232