Analysis
-
max time kernel
192s -
max time network
234s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe
Resource
win10v2004-20221111-en
General
-
Target
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe
-
Size
500KB
-
MD5
683ba16fc97a52c41c0c407a6b379fee
-
SHA1
797a88f51a8fc6b3f4fc1ee0a0fa1d8f691f088f
-
SHA256
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b
-
SHA512
02686f40f85aac6efc1489d2e181a213dee2bbbb76a574f75c796e5a35b26f6b805bed3c91208c73327a0409866843f06cf6868359553273b779ad5974e2541d
-
SSDEEP
12288:XKBLWoD1fKBLWoD1anB9+LEh/TyiAgTwLTtkeVcEE9zSwZfTyQcj4Ihz6lvdKw3J:XKFD1fKFD1anB9+LEh/TyiAgTwLTtke8
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Microsoft\Audiolog.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Audiolog.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Audiolog = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Audiolog.exe" bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe -
Processes:
resource yara_rule behavioral2/memory/3980-135-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3980-137-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3980-138-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3980-146-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3980-147-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3980-152-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audiolog = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Audiolog.exe" bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Audiolog = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Audiolog.exe" bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exedescription pid process target process PID 3960 set thread context of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 1640 reg.exe 4560 reg.exe 3568 reg.exe 1036 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exedescription pid process Token: 1 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeCreateTokenPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeAssignPrimaryTokenPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeLockMemoryPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeIncreaseQuotaPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeMachineAccountPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeTcbPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeSecurityPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeTakeOwnershipPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeLoadDriverPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeSystemProfilePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeSystemtimePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeProfSingleProcessPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeIncBasePriorityPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeCreatePagefilePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeCreatePermanentPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeBackupPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeRestorePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeShutdownPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeDebugPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeAuditPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeSystemEnvironmentPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeChangeNotifyPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeRemoteShutdownPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeUndockPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeSyncAgentPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeEnableDelegationPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeManageVolumePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeImpersonatePrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeCreateGlobalPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: 31 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: 32 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: 33 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: 34 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: 35 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe Token: SeDebugPrivilege 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exebcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exepid process 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exebcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3960 wrote to memory of 3980 3960 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe PID 3980 wrote to memory of 224 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 224 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 224 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3996 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3996 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3996 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3732 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3732 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3732 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3056 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3056 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 3980 wrote to memory of 3056 3980 bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe cmd.exe PID 224 wrote to memory of 1640 224 cmd.exe reg.exe PID 224 wrote to memory of 1640 224 cmd.exe reg.exe PID 224 wrote to memory of 1640 224 cmd.exe reg.exe PID 3996 wrote to memory of 4560 3996 cmd.exe reg.exe PID 3996 wrote to memory of 4560 3996 cmd.exe reg.exe PID 3996 wrote to memory of 4560 3996 cmd.exe reg.exe PID 3732 wrote to memory of 3568 3732 cmd.exe reg.exe PID 3732 wrote to memory of 3568 3732 cmd.exe reg.exe PID 3732 wrote to memory of 3568 3732 cmd.exe reg.exe PID 3056 wrote to memory of 1036 3056 cmd.exe reg.exe PID 3056 wrote to memory of 1036 3056 cmd.exe reg.exe PID 3056 wrote to memory of 1036 3056 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe"C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe"C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Audiolog.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Audiolog.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Audiolog.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Audiolog.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcb72ffc7af798ea42e0ef8dc9617b736433a5667f9e88f96cfea5b24b796b0b.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/224-142-0x0000000000000000-mapping.dmp
-
memory/1036-151-0x0000000000000000-mapping.dmp
-
memory/1640-148-0x0000000000000000-mapping.dmp
-
memory/3056-145-0x0000000000000000-mapping.dmp
-
memory/3568-150-0x0000000000000000-mapping.dmp
-
memory/3732-144-0x0000000000000000-mapping.dmp
-
memory/3980-138-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3980-146-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3980-147-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3980-134-0x0000000000000000-mapping.dmp
-
memory/3980-137-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3980-135-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3980-152-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3996-143-0x0000000000000000-mapping.dmp
-
memory/4560-149-0x0000000000000000-mapping.dmp