Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 19:32
Static task
static1
Behavioral task
behavioral1
Sample
fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe
Resource
win10v2004-20220812-en
General
-
Target
fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe
-
Size
495KB
-
MD5
0deecb315eb35cd6ed16af00d987f160
-
SHA1
c4c8f0f1282709ec173008a14f9c3726501ec100
-
SHA256
fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7
-
SHA512
a513c917c52e5f01a63c0049a1e39a3100dd33da04864b5b214ea704188a60310ba9fccf919c8104e5bf8b73f4769a1ba1c1cec49d9dfe6c12b474f68a85fd7b
-
SSDEEP
12288:FgyohFzwp4jpZBjaPV7G4XvCCnwIOVEFasfpEKlSgl:FgJdwp6PBqPfCiwrVEIsFf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\HqwgIwoY\\YCoQAsQk.exe," fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\HqwgIwoY\\YCoQAsQk.exe," fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3848 ESEgIUIk.exe 2348 YCoQAsQk.exe 3060 qyMYAAUw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ESEgIUIk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YCoQAsQk.exe = "C:\\ProgramData\\HqwgIwoY\\YCoQAsQk.exe" YCoQAsQk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YCoQAsQk.exe = "C:\\ProgramData\\HqwgIwoY\\YCoQAsQk.exe" qyMYAAUw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ESEgIUIk.exe = "C:\\Users\\Admin\\POsYcgwE\\ESEgIUIk.exe" fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YCoQAsQk.exe = "C:\\ProgramData\\HqwgIwoY\\YCoQAsQk.exe" fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ESEgIUIk.exe = "C:\\Users\\Admin\\POsYcgwE\\ESEgIUIk.exe" ESEgIUIk.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheReceiveConvertFrom.rar ESEgIUIk.exe File opened for modification C:\Windows\SysWOW64\sheResumeEnable.mpg ESEgIUIk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\POsYcgwE qyMYAAUw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\POsYcgwE\ESEgIUIk qyMYAAUw.exe File created C:\Windows\SysWOW64\shell32.dll.exe ESEgIUIk.exe File opened for modification C:\Windows\SysWOW64\sheDisableConvertTo.mp3 ESEgIUIk.exe File opened for modification C:\Windows\SysWOW64\sheGetResize.png ESEgIUIk.exe File opened for modification C:\Windows\SysWOW64\sheOutResize.jpg ESEgIUIk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1508 reg.exe 1840 reg.exe 4568 reg.exe 2372 reg.exe 2868 reg.exe 1508 reg.exe 4448 reg.exe 1064 reg.exe 3740 reg.exe 3768 reg.exe 3000 reg.exe 1392 reg.exe 1744 reg.exe 4616 reg.exe 1484 reg.exe 5072 reg.exe 1776 reg.exe 1668 reg.exe 224 reg.exe 3008 reg.exe 1868 reg.exe 3184 reg.exe 2144 reg.exe 1920 reg.exe 3872 reg.exe 1688 reg.exe 4840 reg.exe 3640 reg.exe 2072 reg.exe 556 reg.exe 556 reg.exe 1016 reg.exe 3860 reg.exe 5116 reg.exe 8 reg.exe 3120 reg.exe 1524 reg.exe 4624 reg.exe 3808 reg.exe 1412 reg.exe 3124 reg.exe 4484 reg.exe 4320 reg.exe 4200 reg.exe 4152 reg.exe 4656 reg.exe 1392 reg.exe 1036 reg.exe 5056 reg.exe 2740 reg.exe 5096 reg.exe 1412 reg.exe 5056 reg.exe 4604 reg.exe 4052 reg.exe 3096 reg.exe 4668 reg.exe 3596 reg.exe 1948 reg.exe 4468 reg.exe 1696 reg.exe 4832 reg.exe 1304 reg.exe 1952 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1620 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1620 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1620 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1620 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 400 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 400 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 400 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 400 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3728 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3728 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3728 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3728 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1628 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1628 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1628 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1628 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2372 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2372 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2372 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2372 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2044 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2044 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2044 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 2044 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5068 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5068 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5068 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5068 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1440 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1440 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1440 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 1440 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3960 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3960 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3960 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 3960 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4328 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4328 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4328 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4328 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4896 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4896 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4896 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 4896 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5104 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5104 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5104 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 5104 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3848 ESEgIUIk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe 3848 ESEgIUIk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 3848 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 80 PID 384 wrote to memory of 3848 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 80 PID 384 wrote to memory of 3848 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 80 PID 384 wrote to memory of 2348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 81 PID 384 wrote to memory of 2348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 81 PID 384 wrote to memory of 2348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 81 PID 384 wrote to memory of 4856 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 83 PID 384 wrote to memory of 4856 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 83 PID 384 wrote to memory of 4856 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 83 PID 4856 wrote to memory of 1776 4856 cmd.exe 85 PID 4856 wrote to memory of 1776 4856 cmd.exe 85 PID 4856 wrote to memory of 1776 4856 cmd.exe 85 PID 384 wrote to memory of 1064 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 86 PID 384 wrote to memory of 1064 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 86 PID 384 wrote to memory of 1064 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 86 PID 384 wrote to memory of 2280 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 88 PID 384 wrote to memory of 2280 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 88 PID 384 wrote to memory of 2280 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 88 PID 384 wrote to memory of 4348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 89 PID 384 wrote to memory of 4348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 89 PID 384 wrote to memory of 4348 384 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 89 PID 1776 wrote to memory of 1744 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 92 PID 1776 wrote to memory of 1744 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 92 PID 1776 wrote to memory of 1744 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 92 PID 1776 wrote to memory of 2880 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 94 PID 1776 wrote to memory of 2880 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 94 PID 1776 wrote to memory of 2880 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 94 PID 1744 wrote to memory of 4156 1744 cmd.exe 95 PID 1744 wrote to memory of 4156 1744 cmd.exe 95 PID 1744 wrote to memory of 4156 1744 cmd.exe 95 PID 1776 wrote to memory of 3184 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 97 PID 1776 wrote to memory of 3184 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 97 PID 1776 wrote to memory of 3184 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 97 PID 1776 wrote to memory of 4568 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 98 PID 1776 wrote to memory of 4568 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 98 PID 1776 wrote to memory of 4568 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 98 PID 1776 wrote to memory of 4500 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 100 PID 1776 wrote to memory of 4500 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 100 PID 1776 wrote to memory of 4500 1776 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 100 PID 4156 wrote to memory of 3968 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 103 PID 4156 wrote to memory of 3968 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 103 PID 4156 wrote to memory of 3968 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 103 PID 4156 wrote to memory of 1016 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 105 PID 4156 wrote to memory of 1016 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 105 PID 4156 wrote to memory of 1016 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 105 PID 4156 wrote to memory of 3992 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 106 PID 4156 wrote to memory of 3992 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 106 PID 4156 wrote to memory of 3992 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 106 PID 4156 wrote to memory of 2372 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 107 PID 4156 wrote to memory of 2372 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 107 PID 4156 wrote to memory of 2372 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 107 PID 4156 wrote to memory of 5004 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 108 PID 4156 wrote to memory of 5004 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 108 PID 4156 wrote to memory of 5004 4156 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 108 PID 4500 wrote to memory of 4688 4500 cmd.exe 113 PID 4500 wrote to memory of 4688 4500 cmd.exe 113 PID 4500 wrote to memory of 4688 4500 cmd.exe 113 PID 3968 wrote to memory of 1620 3968 cmd.exe 114 PID 3968 wrote to memory of 1620 3968 cmd.exe 114 PID 3968 wrote to memory of 1620 3968 cmd.exe 114 PID 5004 wrote to memory of 4852 5004 cmd.exe 115 PID 5004 wrote to memory of 4852 5004 cmd.exe 115 PID 5004 wrote to memory of 4852 5004 cmd.exe 115 PID 1620 wrote to memory of 4080 1620 fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe 116 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe"C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\POsYcgwE\ESEgIUIk.exe"C:\Users\Admin\POsYcgwE\ESEgIUIk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3848
-
-
C:\ProgramData\HqwgIwoY\YCoQAsQk.exe"C:\ProgramData\HqwgIwoY\YCoQAsQk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f73⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"4⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f75⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"6⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f77⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"8⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f79⤵
- Suspicious behavior: EnumeratesProcesses
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"10⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f711⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"12⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f713⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"14⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f715⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"16⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f717⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"18⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f719⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"20⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f721⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"22⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f723⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"24⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f725⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"26⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f727⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"28⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f729⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"30⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f731⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"32⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f733⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"34⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f735⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"36⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f737⤵PID:428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"38⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f739⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"40⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f741⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"42⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f743⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"44⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f745⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"46⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f747⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"48⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f749⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"50⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f751⤵
- Modifies visibility of file extensions in Explorer
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"52⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f753⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"54⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f755⤵PID:3652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"56⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f757⤵PID:3700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"58⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f759⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"60⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f761⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"62⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f763⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"64⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f765⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"66⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f767⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"68⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f769⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"70⤵PID:4524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f771⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"72⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f773⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"74⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f775⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"76⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f777⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"78⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:428 -
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f779⤵PID:3516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"80⤵PID:372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
- UAC bypass
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f781⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"82⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f783⤵PID:792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"84⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f785⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"86⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f787⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"88⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f789⤵PID:688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"90⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f791⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"92⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f793⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"94⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f795⤵PID:2168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"96⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f797⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"98⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f799⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"100⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7101⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"102⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7103⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"104⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7105⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"106⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7107⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"108⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7109⤵PID:824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"110⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7111⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"112⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7113⤵PID:2076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"114⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7115⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"116⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7117⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"118⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7119⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"120⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7.exeC:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7121⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fbd76c2b47bbbbf3e2ecc3fbd73bc5a22e237efad379b74ed9c5ac4906e237f7"122⤵PID:1636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-