Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe
Resource
win10v2004-20220812-en
General
-
Target
738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe
-
Size
492KB
-
MD5
0d5db5606344289905ffde8fc2d42a10
-
SHA1
9b1a29083cfa6c41d493246daa84d8c9bcd0c159
-
SHA256
738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d
-
SHA512
197dbd9805d93d1d62903fa11615a288cb226a0b0f2ddfd0bbe543e7c572aeb9d9203b4b6a81cd756bd4ff280961ac8c0e5a65a7be49eaf3341bf6b8de9e2f9c
-
SSDEEP
12288:vg9QKS/9gFM+tvYr5hdI6iypAy8DkxRY10:o99S+FM+Y5Jp0ACO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\docUQAcE\\zOAgQUYY.exe," 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\docUQAcE\\zOAgQUYY.exe," 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3132 SWAwIIcQ.exe 3460 zOAgQUYY.exe 4892 jCcssgcE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation SWAwIIcQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SWAwIIcQ.exe = "C:\\Users\\Admin\\amgccgoE\\SWAwIIcQ.exe" 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zOAgQUYY.exe = "C:\\ProgramData\\docUQAcE\\zOAgQUYY.exe" 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SWAwIIcQ.exe = "C:\\Users\\Admin\\amgccgoE\\SWAwIIcQ.exe" SWAwIIcQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zOAgQUYY.exe = "C:\\ProgramData\\docUQAcE\\zOAgQUYY.exe" zOAgQUYY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zOAgQUYY.exe = "C:\\ProgramData\\docUQAcE\\zOAgQUYY.exe" jCcssgcE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\amgccgoE jCcssgcE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\amgccgoE\SWAwIIcQ jCcssgcE.exe File created C:\Windows\SysWOW64\shell32.dll.exe SWAwIIcQ.exe File opened for modification C:\Windows\SysWOW64\sheReceiveStart.docx SWAwIIcQ.exe File opened for modification C:\Windows\SysWOW64\sheResumeWatch.pptm SWAwIIcQ.exe File opened for modification C:\Windows\SysWOW64\sheUndoClear.gif SWAwIIcQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4804 reg.exe 4216 reg.exe 1856 reg.exe 2732 reg.exe 3020 reg.exe 4568 reg.exe 1180 reg.exe 2156 reg.exe 2972 reg.exe 1816 reg.exe 5004 reg.exe 1112 reg.exe 1072 reg.exe 2468 reg.exe 3184 reg.exe 5024 reg.exe 464 reg.exe 2144 reg.exe 5108 reg.exe 1768 reg.exe 1820 reg.exe 3392 reg.exe 1440 reg.exe 112 reg.exe 2360 reg.exe 3652 reg.exe 2320 reg.exe 3256 reg.exe 1216 reg.exe 4948 reg.exe 3296 reg.exe 884 reg.exe 800 reg.exe 1984 reg.exe 4316 reg.exe 4948 reg.exe 4236 reg.exe 3892 reg.exe 3520 reg.exe 3396 reg.exe 3444 reg.exe 4556 reg.exe 1832 reg.exe 3548 reg.exe 4804 reg.exe 1364 reg.exe 2408 reg.exe 756 reg.exe 3300 reg.exe 2696 reg.exe 3652 reg.exe 4496 reg.exe 4080 reg.exe 4760 reg.exe 2304 reg.exe 4664 reg.exe 4904 reg.exe 912 reg.exe 2304 reg.exe 1276 reg.exe 728 reg.exe 1784 reg.exe 2604 reg.exe 4508 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3880 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3880 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3880 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3880 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5088 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5088 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5088 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5088 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5064 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5064 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5064 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5064 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2604 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2604 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2604 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2604 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4696 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4696 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4696 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4696 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5048 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5048 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5048 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 5048 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4688 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4688 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4688 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4688 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2060 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2060 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2060 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 2060 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4516 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4516 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4516 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4516 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4076 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4076 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4076 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 4076 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3932 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3932 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3932 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3932 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3556 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3556 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3556 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 3556 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3132 SWAwIIcQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe 3132 SWAwIIcQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3132 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 83 PID 4904 wrote to memory of 3132 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 83 PID 4904 wrote to memory of 3132 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 83 PID 4904 wrote to memory of 3460 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 84 PID 4904 wrote to memory of 3460 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 84 PID 4904 wrote to memory of 3460 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 84 PID 4904 wrote to memory of 3444 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 86 PID 4904 wrote to memory of 3444 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 86 PID 4904 wrote to memory of 3444 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 86 PID 3444 wrote to memory of 8 3444 cmd.exe 88 PID 3444 wrote to memory of 8 3444 cmd.exe 88 PID 3444 wrote to memory of 8 3444 cmd.exe 88 PID 4904 wrote to memory of 3716 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 89 PID 4904 wrote to memory of 3716 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 89 PID 4904 wrote to memory of 3716 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 89 PID 4904 wrote to memory of 3396 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 94 PID 4904 wrote to memory of 3396 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 94 PID 4904 wrote to memory of 3396 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 94 PID 4904 wrote to memory of 4164 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 91 PID 4904 wrote to memory of 4164 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 91 PID 4904 wrote to memory of 4164 4904 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 91 PID 8 wrote to memory of 884 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 95 PID 8 wrote to memory of 884 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 95 PID 8 wrote to memory of 884 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 95 PID 884 wrote to memory of 5084 884 cmd.exe 97 PID 884 wrote to memory of 5084 884 cmd.exe 97 PID 884 wrote to memory of 5084 884 cmd.exe 97 PID 8 wrote to memory of 4236 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 101 PID 8 wrote to memory of 4236 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 101 PID 8 wrote to memory of 4236 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 101 PID 8 wrote to memory of 2156 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 100 PID 8 wrote to memory of 2156 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 100 PID 8 wrote to memory of 2156 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 100 PID 8 wrote to memory of 3300 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 99 PID 8 wrote to memory of 3300 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 99 PID 8 wrote to memory of 3300 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 99 PID 8 wrote to memory of 3388 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 104 PID 8 wrote to memory of 3388 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 104 PID 8 wrote to memory of 3388 8 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 104 PID 5084 wrote to memory of 3788 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 106 PID 5084 wrote to memory of 3788 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 106 PID 5084 wrote to memory of 3788 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 106 PID 3388 wrote to memory of 1324 3388 cmd.exe 109 PID 3388 wrote to memory of 1324 3388 cmd.exe 109 PID 3388 wrote to memory of 1324 3388 cmd.exe 109 PID 3788 wrote to memory of 3244 3788 cmd.exe 108 PID 3788 wrote to memory of 3244 3788 cmd.exe 108 PID 3788 wrote to memory of 3244 3788 cmd.exe 108 PID 5084 wrote to memory of 3556 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 110 PID 5084 wrote to memory of 3556 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 110 PID 5084 wrote to memory of 3556 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 110 PID 5084 wrote to memory of 3588 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 111 PID 5084 wrote to memory of 3588 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 111 PID 5084 wrote to memory of 3588 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 111 PID 5084 wrote to memory of 4696 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 113 PID 5084 wrote to memory of 4696 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 113 PID 5084 wrote to memory of 4696 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 113 PID 5084 wrote to memory of 4584 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 115 PID 5084 wrote to memory of 4584 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 115 PID 5084 wrote to memory of 4584 5084 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 115 PID 3244 wrote to memory of 3828 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 117 PID 3244 wrote to memory of 3828 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 117 PID 3244 wrote to memory of 3828 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 117 PID 3244 wrote to memory of 3428 3244 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe 120 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe"C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\amgccgoE\SWAwIIcQ.exe"C:\Users\Admin\amgccgoE\SWAwIIcQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3132
-
-
C:\ProgramData\docUQAcE\zOAgQUYY.exe"C:\ProgramData\docUQAcE\zOAgQUYY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"4⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"6⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"8⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"10⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"12⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d13⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"14⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"16⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"18⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"20⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"22⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"24⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"26⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"28⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"30⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"32⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d33⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"34⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d35⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"36⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d37⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"38⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d39⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"40⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d41⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"42⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d43⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"44⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d45⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"46⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d47⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"48⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d49⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"50⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d51⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"52⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d53⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"54⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d55⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"56⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d57⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"58⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d59⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"60⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d61⤵PID:2136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"62⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d63⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"64⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d65⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"66⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d67⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"68⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d69⤵PID:3556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"70⤵PID:3400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d71⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"72⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d73⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"74⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d75⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"76⤵
- Checks whether UAC is enabled
- System policy modification
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d77⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"78⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d79⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"80⤵PID:4504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d81⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"82⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d83⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"84⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d85⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"86⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d87⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"88⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d89⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"90⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d91⤵PID:2756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"92⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d93⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"94⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d95⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"96⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d97⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"98⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d99⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"100⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d101⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"102⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d103⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"104⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d105⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"106⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d107⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"108⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d109⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"110⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d111⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"112⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d113⤵PID:112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"114⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d115⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"116⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d117⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"118⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d119⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"120⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d.exeC:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d121⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\738cc8cf2db1e6743615b6e23016ab0ccf74f85802216bc47b161cd0dfa23c9d"122⤵PID:1584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-