Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
KMSpico_11_final_setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
KMSpico_11_final_setup.exe
Resource
win10v2004-20230221-en
General
-
Target
KMSpico_11_final_setup.exe
-
Size
6.6MB
-
MD5
78d2d7076e5c3f18ef75e4e570b1e0fe
-
SHA1
8e15869622584d541465f37a87030f171960b7f1
-
SHA256
e0c720e092c6c0265f3e2a37f0636a26a7fdefc6a49069c659dbe3c5e35aefd6
-
SHA512
75e4ddadc01ad2d8ed66d76e7f9899f79f1605e82ebbd60d76e15dfd8f76502f1ca0213ae36fbe3d2d6d4268ebb9621dc88d9f247b69078fdf8ad6e4e4f10997
-
SSDEEP
196608:A4/yHz6/hnjvDc9L+4NKg0KWT/f+89ve:TaT6pnTSLZLrWT/2uG
Malware Config
Signatures
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum KMSpico_11_final_setup.exe 2064 schtasks.exe 1484 schtasks.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation KMSpico_setup.tmp Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation KMSpico_setup.tmp Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation KMSpico_11_final_setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe -
Executes dropped EXE 7 IoCs
pid Process 4028 a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe 3504 KMSpico_setup.exe 4740 KMSpico_setup.tmp 1928 KMSpico_setup.exe 5112 KMSpico_setup.tmp 4712 _setup.exe 3508 _setup.tmp -
Loads dropped DLL 2 IoCs
pid Process 4740 KMSpico_setup.tmp 5112 KMSpico_setup.tmp -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe File opened for modification C:\Windows\assembly\Desktop.ini a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum KMSpico_11_final_setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 KMSpico_11_final_setup.exe -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName KMSpico_setup.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3584 set thread context of 3960 3584 KMSpico_11_final_setup.exe 85 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\InstallShield\Update\ISUSPM.exe KMSpico_setup.tmp File created C:\Program Files (x86)\Common Files\InstallShield\Update\is-PPL6R.tmp KMSpico_setup.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe File created C:\Windows\assembly\Desktop.ini a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe File opened for modification C:\Windows\assembly\Desktop.ini a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2728 sc.exe 792 sc.exe 3476 sc.exe 3340 sc.exe 1416 sc.exe 1368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1484 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 4580 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings KMSpico_setup.tmp -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4028 a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe 5112 KMSpico_setup.tmp 5112 KMSpico_setup.tmp -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3584 KMSpico_11_final_setup.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3584 KMSpico_11_final_setup.exe Token: SeDebugPrivilege 4028 a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe Token: SeDebugPrivilege 4580 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5112 KMSpico_setup.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3960 3584 KMSpico_11_final_setup.exe 85 PID 3584 wrote to memory of 3960 3584 KMSpico_11_final_setup.exe 85 PID 3584 wrote to memory of 3960 3584 KMSpico_11_final_setup.exe 85 PID 3584 wrote to memory of 3960 3584 KMSpico_11_final_setup.exe 85 PID 3584 wrote to memory of 4028 3584 KMSpico_11_final_setup.exe 86 PID 3584 wrote to memory of 4028 3584 KMSpico_11_final_setup.exe 86 PID 4028 wrote to memory of 4792 4028 a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe 88 PID 4028 wrote to memory of 4792 4028 a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe 88 PID 4792 wrote to memory of 3504 4792 WScript.exe 89 PID 4792 wrote to memory of 3504 4792 WScript.exe 89 PID 4792 wrote to memory of 3504 4792 WScript.exe 89 PID 3504 wrote to memory of 4740 3504 KMSpico_setup.exe 90 PID 3504 wrote to memory of 4740 3504 KMSpico_setup.exe 90 PID 3504 wrote to memory of 4740 3504 KMSpico_setup.exe 90 PID 4740 wrote to memory of 1928 4740 KMSpico_setup.tmp 91 PID 4740 wrote to memory of 1928 4740 KMSpico_setup.tmp 91 PID 4740 wrote to memory of 1928 4740 KMSpico_setup.tmp 91 PID 1928 wrote to memory of 5112 1928 KMSpico_setup.exe 92 PID 1928 wrote to memory of 5112 1928 KMSpico_setup.exe 92 PID 1928 wrote to memory of 5112 1928 KMSpico_setup.exe 92 PID 5112 wrote to memory of 4580 5112 KMSpico_setup.tmp 93 PID 5112 wrote to memory of 4580 5112 KMSpico_setup.tmp 93 PID 5112 wrote to memory of 4580 5112 KMSpico_setup.tmp 93 PID 5112 wrote to memory of 264 5112 KMSpico_setup.tmp 95 PID 5112 wrote to memory of 264 5112 KMSpico_setup.tmp 95 PID 5112 wrote to memory of 264 5112 KMSpico_setup.tmp 95 PID 5112 wrote to memory of 2444 5112 KMSpico_setup.tmp 97 PID 5112 wrote to memory of 2444 5112 KMSpico_setup.tmp 97 PID 5112 wrote to memory of 2444 5112 KMSpico_setup.tmp 97 PID 5112 wrote to memory of 1368 5112 KMSpico_setup.tmp 98 PID 5112 wrote to memory of 1368 5112 KMSpico_setup.tmp 98 PID 5112 wrote to memory of 1368 5112 KMSpico_setup.tmp 98 PID 5112 wrote to memory of 2728 5112 KMSpico_setup.tmp 100 PID 5112 wrote to memory of 2728 5112 KMSpico_setup.tmp 100 PID 5112 wrote to memory of 2728 5112 KMSpico_setup.tmp 100 PID 5112 wrote to memory of 792 5112 KMSpico_setup.tmp 102 PID 5112 wrote to memory of 792 5112 KMSpico_setup.tmp 102 PID 5112 wrote to memory of 792 5112 KMSpico_setup.tmp 102 PID 2444 wrote to memory of 3572 2444 WScript.exe 104 PID 2444 wrote to memory of 3572 2444 WScript.exe 104 PID 2444 wrote to memory of 3572 2444 WScript.exe 104 PID 5112 wrote to memory of 3476 5112 KMSpico_setup.tmp 105 PID 5112 wrote to memory of 3476 5112 KMSpico_setup.tmp 105 PID 5112 wrote to memory of 3476 5112 KMSpico_setup.tmp 105 PID 5112 wrote to memory of 3340 5112 KMSpico_setup.tmp 108 PID 5112 wrote to memory of 3340 5112 KMSpico_setup.tmp 108 PID 5112 wrote to memory of 3340 5112 KMSpico_setup.tmp 108 PID 3572 wrote to memory of 708 3572 cmd.exe 109 PID 3572 wrote to memory of 708 3572 cmd.exe 109 PID 3572 wrote to memory of 708 3572 cmd.exe 109 PID 5112 wrote to memory of 1416 5112 KMSpico_setup.tmp 111 PID 5112 wrote to memory of 1416 5112 KMSpico_setup.tmp 111 PID 5112 wrote to memory of 1416 5112 KMSpico_setup.tmp 111 PID 2444 wrote to memory of 4116 2444 WScript.exe 113 PID 2444 wrote to memory of 4116 2444 WScript.exe 113 PID 2444 wrote to memory of 4116 2444 WScript.exe 113 PID 5112 wrote to memory of 2064 5112 KMSpico_setup.tmp 115 PID 5112 wrote to memory of 2064 5112 KMSpico_setup.tmp 115 PID 5112 wrote to memory of 2064 5112 KMSpico_setup.tmp 115 PID 4116 wrote to memory of 2208 4116 cmd.exe 117 PID 4116 wrote to memory of 2208 4116 cmd.exe 117 PID 4116 wrote to memory of 2208 4116 cmd.exe 117 PID 2444 wrote to memory of 3852 2444 WScript.exe 118 PID 2444 wrote to memory of 3852 2444 WScript.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\KMSpico_11_final_setup.exe"C:\Users\Admin\AppData\Local\Temp\KMSpico_11_final_setup.exe"1⤵
- Luminosity
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\KMSpico_11_final_setup.exe"C:\Users\Admin\AppData\Local\Temp\KMSpico_11_final_setup.exe"2⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe"C:\Users\Admin\AppData\Local\Temp\a5a8c2dc-878f-4b7b-b58c-0dc250e9930c.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\125665993.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe"C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\is-4C4LI.tmp\KMSpico_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-4C4LI.tmp\KMSpico_setup.tmp" /SL5="$2021A,3598500,122880,C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe"C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\is-T82S0.tmp\KMSpico_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-T82S0.tmp\KMSpico_setup.tmp" /SL5="$30224,3598500,122880,C:\Users\Admin\AppData\Local\Temp\5e57de42-5fb2-46fd-a0ff-879f70c92e61\KMSpico_setup.exe" /VERYSILENT7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /f /im "ISUSPM.exe"8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn * /f8⤵PID:264
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\is-5S3M7.tmp\netisolation.vbs"8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=1527c705-839a-4832-9118-54d4Bd6a0c89_cw5n1h2txyewy9⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=1527c705-839a-4832-9118-54d4Bd6a0c89_cw5n1h2txyewy10⤵PID:708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=ActiveSync9⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=ActiveSync10⤵PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy9⤵PID:3852
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy10⤵PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy9⤵PID:3692
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy10⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE_cw5n1h2txyewy9⤵PID:3636
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE_cw5n1h2txyewy10⤵PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy9⤵PID:2164
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy10⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AccountsControl_cw5n1h2txyewy9⤵PID:2100
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AccountsControl_cw5n1h2txyewy10⤵PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AsyncTextService_8wekyb3d8bbwe9⤵PID:548
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.AsyncTextService_8wekyb3d8bbwe10⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.BioEnrollment_cw5n1h2txyewy9⤵PID:1216
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.BioEnrollment_cw5n1h2txyewy10⤵PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.CredDialogHost_cw5n1h2txyewy9⤵PID:4300
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.CredDialogHost_cw5n1h2txyewy10⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.ECApp_8wekyb3d8bbwe9⤵PID:5024
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.ECApp_8wekyb3d8bbwe10⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.LockApp_cw5n1h2txyewy9⤵PID:772
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.LockApp_cw5n1h2txyewy10⤵PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe9⤵PID:4956
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe10⤵PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.MicrosoftEdge_8wekyb3d8bbwe9⤵PID:4364
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.MicrosoftEdge_8wekyb3d8bbwe10⤵PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.VCLibs.140.00_8wekyb3d8bbwe9⤵PID:1856
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.VCLibs.140.00_8wekyb3d8bbwe10⤵PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Win32WebViewHost_cw5n1h2txyewy9⤵PID:2656
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Win32WebViewHost_cw5n1h2txyewy10⤵PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy9⤵PID:1408
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy10⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy9⤵PID:792
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy10⤵PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CallingShellApp_cw5n1h2txyewy9⤵PID:2552
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CallingShellApp_cw5n1h2txyewy10⤵PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CapturePicker_cw5n1h2txyewy9⤵PID:3372
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CapturePicker_cw5n1h2txyewy10⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy9⤵PID:2068
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy10⤵PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy9⤵PID:2196
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy10⤵PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.NarratorQuickStart_8wekyb3d8bbwe9⤵PID:2304
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.NarratorQuickStart_8wekyb3d8bbwe10⤵PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy9⤵PID:4204
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy10⤵PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy9⤵PID:1700
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy10⤵PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ParentalControls_cw5n1h2txyewy9⤵PID:3188
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ParentalControls_cw5n1h2txyewy10⤵PID:788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy9⤵PID:3568
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy10⤵PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy9⤵PID:4916
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy10⤵PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.Search_cw5n1h2txyewy9⤵PID:2712
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.Search_cw5n1h2txyewy10⤵PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy9⤵PID:3928
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy10⤵PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy9⤵PID:4696
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy10⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy9⤵PID:4404
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy10⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy9⤵PID:5024
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy10⤵PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.XboxGameCallableUI_cw5n1h2txyewy9⤵PID:4252
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Microsoft.XboxGameCallableUI_cw5n1h2txyewy10⤵PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=MicrosoftWindows.Client.CBS_cw5n1h2txyewy9⤵PID:1692
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=MicrosoftWindows.Client.CBS_cw5n1h2txyewy10⤵PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy9⤵PID:4364
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy10⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=NcsiUwpApp_8wekyb3d8bbwe9⤵PID:1856
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=NcsiUwpApp_8wekyb3d8bbwe10⤵PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Windows.CBSPreview_cw5n1h2txyewy9⤵PID:2656
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Windows.CBSPreview_cw5n1h2txyewy10⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=windows.immersivecontrolpanel_cw5n1h2txyewy9⤵PID:1408
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=windows.immersivecontrolpanel_cw5n1h2txyewy10⤵PID:376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=Windows.PrintDialog_cw5n1h2txyewy9⤵PID:1088
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=Windows.PrintDialog_cw5n1h2txyewy10⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CheckNetIsolation.exe LoopbackExempt -a -n=windows_ie_ac_0019⤵PID:1016
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n=windows_ie_ac_00110⤵PID:4424
-
-
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete isupdate.exe8⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete ISUSPM.exe8⤵
- Launches sc.exe
PID:2728
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete msiupd.exe8⤵
- Launches sc.exe
PID:792
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete router.exe8⤵
- Launches sc.exe
PID:3476
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete Updater.exe8⤵
- Launches sc.exe
PID:3340
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete updatesvc.exe8⤵
- Launches sc.exe
PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /F /SC ONLOGON /RL HIGHEST /TN "InstallShield® Update Service Scheduler" /TR "'C:\Program Files (x86)\Common Files\InstallShield\Update\ISUSPM.exe'"8⤵
- Luminosity
PID:2064
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /F /SC WEEKLY /D WED,SUN /ST 12:00 /RL HIGHEST /TN "Optimize Thumbnail Cache Files" /TR "wscript.exe //nologo //E:jscript //B C:\ProgramData\InstallShield\Update\isuspm.ini"8⤵
- Luminosity
- Creates scheduled task(s)
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\is-5S3M7.tmp\_setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5S3M7.tmp\_setup.exe"8⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\is-NPPB9.tmp\_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-NPPB9.tmp\_setup.tmp" /SL5="$90260,2952592,69120,C:\Users\Admin\AppData\Local\Temp\is-5S3M7.tmp\_setup.exe"9⤵
- Executes dropped EXE
PID:3508
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
511B
MD5b78d84d98549910a6b639196988d73d9
SHA143c620c32b923e54e7b27a700836939e952fe226
SHA25610b2e6313460af7d99911e21de85096d553bb80c23a89491031fe03867737314
SHA512a5256f57e7f81736c212e35f77d56fd5f7c31b16591ba7e237a7c4291435bdbe7e20bc02afbf3526c92e36d7f522c0078cefdb3e4c30ad210a1a52603d333ddd
-
Filesize
511B
MD5b78d84d98549910a6b639196988d73d9
SHA143c620c32b923e54e7b27a700836939e952fe226
SHA25610b2e6313460af7d99911e21de85096d553bb80c23a89491031fe03867737314
SHA512a5256f57e7f81736c212e35f77d56fd5f7c31b16591ba7e237a7c4291435bdbe7e20bc02afbf3526c92e36d7f522c0078cefdb3e4c30ad210a1a52603d333ddd
-
Filesize
3.7MB
MD5f2d3ac0f919ceaef19dc3ae5f96cc038
SHA10189ef96d041bd8e3cb940c4329c05907fd5c0e3
SHA2562fd8eed51595006b591eeade829e304c4db4c11c60aa733a7000629c4b92d34c
SHA51278d5be1f2df96b30154406ec7f11a8031f7bad400050344c73ef8f98dd5c8c467ad8e7bd6370c0315ad0f43969c409c6c991d26071b08dd04b631f99a49b8c63
-
Filesize
3.7MB
MD5f2d3ac0f919ceaef19dc3ae5f96cc038
SHA10189ef96d041bd8e3cb940c4329c05907fd5c0e3
SHA2562fd8eed51595006b591eeade829e304c4db4c11c60aa733a7000629c4b92d34c
SHA51278d5be1f2df96b30154406ec7f11a8031f7bad400050344c73ef8f98dd5c8c467ad8e7bd6370c0315ad0f43969c409c6c991d26071b08dd04b631f99a49b8c63
-
Filesize
3.7MB
MD5f2d3ac0f919ceaef19dc3ae5f96cc038
SHA10189ef96d041bd8e3cb940c4329c05907fd5c0e3
SHA2562fd8eed51595006b591eeade829e304c4db4c11c60aa733a7000629c4b92d34c
SHA51278d5be1f2df96b30154406ec7f11a8031f7bad400050344c73ef8f98dd5c8c467ad8e7bd6370c0315ad0f43969c409c6c991d26071b08dd04b631f99a49b8c63
-
Filesize
3.7MB
MD5f2d3ac0f919ceaef19dc3ae5f96cc038
SHA10189ef96d041bd8e3cb940c4329c05907fd5c0e3
SHA2562fd8eed51595006b591eeade829e304c4db4c11c60aa733a7000629c4b92d34c
SHA51278d5be1f2df96b30154406ec7f11a8031f7bad400050344c73ef8f98dd5c8c467ad8e7bd6370c0315ad0f43969c409c6c991d26071b08dd04b631f99a49b8c63
-
Filesize
4.1MB
MD5be894480a8ecc85ac82d4e9075481333
SHA1a3c8c8be6dcb906f63db1573eb034952e75570f5
SHA256cb5e2b75694b32b8c160e2a6f97905c6049defcab124937698f092b7fc4c82a1
SHA512c4751e28189bd17f294ba804fbe9eb7181c64fc09ed3eb91d9d267a6dab589929322e650de31d473a6a1003a223abb123dd87642bd291959affc757aaa0e1f3e
-
Filesize
4.1MB
MD5be894480a8ecc85ac82d4e9075481333
SHA1a3c8c8be6dcb906f63db1573eb034952e75570f5
SHA256cb5e2b75694b32b8c160e2a6f97905c6049defcab124937698f092b7fc4c82a1
SHA512c4751e28189bd17f294ba804fbe9eb7181c64fc09ed3eb91d9d267a6dab589929322e650de31d473a6a1003a223abb123dd87642bd291959affc757aaa0e1f3e
-
Filesize
4.1MB
MD5be894480a8ecc85ac82d4e9075481333
SHA1a3c8c8be6dcb906f63db1573eb034952e75570f5
SHA256cb5e2b75694b32b8c160e2a6f97905c6049defcab124937698f092b7fc4c82a1
SHA512c4751e28189bd17f294ba804fbe9eb7181c64fc09ed3eb91d9d267a6dab589929322e650de31d473a6a1003a223abb123dd87642bd291959affc757aaa0e1f3e
-
Filesize
767KB
MD5fb33895f8356d68212e76eb4e0654322
SHA1cd2531ed83c3c879df1de7c10916f3aa0770a199
SHA256a2b3b9ef41be708ab10402be3efcabe02af9554fba930abbb02d63c1ff2b62ab
SHA51238f0216a867067b7ef5fbbc8766f47e22fb348afa20d209c2901937fb3381e121f6779c0825ab150ff3053b55fc4db2479d3b1cd41649e51fcff1691a821210c
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
425B
MD5cd59fd7361ec4a1d8b17cc19a94e7049
SHA11ce48e432ad2fed603a416f05ebbb2d510804701
SHA256b464eeb18f9d949afc637516b363f5d2fdae0d5b8057451e50d4e8582fe0d566
SHA512b0028b6faa7b14e55375c6f657da87010927c5231bb7a9a9e3c105671b47f2d82c4707a77a0a6f26ce85fe8e2909bd52a4c12a94a4ccd641cc7f68221d2c095e
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
703KB
MD51778c1f66ff205875a6435a33229ab3c
SHA15b6189159b16c6f85feed66834af3e06c0277a19
SHA25695c06acac4fe4598840e5556f9613d43aa1039c52dac64536f59e45a70f79da6
SHA5128844de1296ce707e3c5c71823f5118f8f2e50287ace3a2ee1ec0b69df0ec48ebcf5b755db669d2cd869d345fb06a9c07b36e98eda8c32a9b26b8fe22bdc105a0
-
Filesize
703KB
MD51778c1f66ff205875a6435a33229ab3c
SHA15b6189159b16c6f85feed66834af3e06c0277a19
SHA25695c06acac4fe4598840e5556f9613d43aa1039c52dac64536f59e45a70f79da6
SHA5128844de1296ce707e3c5c71823f5118f8f2e50287ace3a2ee1ec0b69df0ec48ebcf5b755db669d2cd869d345fb06a9c07b36e98eda8c32a9b26b8fe22bdc105a0
-
Filesize
767KB
MD5fb33895f8356d68212e76eb4e0654322
SHA1cd2531ed83c3c879df1de7c10916f3aa0770a199
SHA256a2b3b9ef41be708ab10402be3efcabe02af9554fba930abbb02d63c1ff2b62ab
SHA51238f0216a867067b7ef5fbbc8766f47e22fb348afa20d209c2901937fb3381e121f6779c0825ab150ff3053b55fc4db2479d3b1cd41649e51fcff1691a821210c