Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
25c0a17378ed06exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
25c0a17378ed06exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
25c0a17378ed06exeexeexeex.exe
-
Size
204KB
-
MD5
25c0a17378ed06242717e69b42b51b8d
-
SHA1
2592ea2f28efe478ac042edf2c0a8739941054f8
-
SHA256
e8f779aa8691150666aebdc3bd4b57b0dcdf43ab76ddb3d3d673cd3889019088
-
SHA512
f6ab5df57fa1de2d7fdf1420aced07b4441e4208035ef112b97dd16b7c367b176f61c13115a20eefb8eacfb27990d4384488992c203f6bbc677a3429676fea6b
-
SSDEEP
3072:6ho1jshIqjLdyQb1HIRe39gmpB0JI43GrforUZ9HtSAVX8iqOTwLWe:6ho1fQpB3rpBOhW8rUZ9NhXAO2n
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation fGIQkEAk.exe -
Executes dropped EXE 2 IoCs
pid Process 3392 WQcIgUIM.exe 700 fGIQkEAk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQcIgUIM.exe = "C:\\Users\\Admin\\tsgkcgkw\\WQcIgUIM.exe" 25c0a17378ed06exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fGIQkEAk.exe = "C:\\ProgramData\\jecYAgUs\\fGIQkEAk.exe" 25c0a17378ed06exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQcIgUIM.exe = "C:\\Users\\Admin\\tsgkcgkw\\WQcIgUIM.exe" WQcIgUIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fGIQkEAk.exe = "C:\\ProgramData\\jecYAgUs\\fGIQkEAk.exe" fGIQkEAk.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25c0a17378ed06exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe fGIQkEAk.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe fGIQkEAk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4968 reg.exe 3720 reg.exe 4008 reg.exe 3760 reg.exe 392 reg.exe 876 reg.exe 1992 reg.exe 3892 reg.exe 4276 Process not Found 3732 reg.exe 3916 reg.exe 3800 reg.exe 4244 reg.exe 3700 reg.exe 4728 reg.exe 4256 reg.exe 4824 Process not Found 4332 reg.exe 556 reg.exe 4500 reg.exe 812 reg.exe 2280 reg.exe 968 reg.exe 2856 reg.exe 4376 reg.exe 3624 reg.exe 2248 reg.exe 4464 reg.exe 3040 reg.exe 2448 reg.exe 1560 reg.exe 4060 reg.exe 4908 reg.exe 1060 reg.exe 944 reg.exe 1540 reg.exe 2220 reg.exe 4496 reg.exe 4028 reg.exe 4356 reg.exe 3236 reg.exe 3524 reg.exe 2988 Process not Found 3676 reg.exe 1640 reg.exe 712 reg.exe 4464 reg.exe 3124 reg.exe 1248 reg.exe 1428 reg.exe 2988 reg.exe 5076 reg.exe 4264 reg.exe 944 reg.exe 2164 reg.exe 1692 reg.exe 2732 reg.exe 2836 reg.exe 4460 reg.exe 4644 reg.exe 1548 reg.exe 2204 reg.exe 968 reg.exe 4544 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3136 25c0a17378ed06exeexeexeex.exe 3136 25c0a17378ed06exeexeexeex.exe 3136 25c0a17378ed06exeexeexeex.exe 3136 25c0a17378ed06exeexeexeex.exe 4108 25c0a17378ed06exeexeexeex.exe 4108 25c0a17378ed06exeexeexeex.exe 4108 25c0a17378ed06exeexeexeex.exe 4108 25c0a17378ed06exeexeexeex.exe 5020 25c0a17378ed06exeexeexeex.exe 5020 25c0a17378ed06exeexeexeex.exe 5020 25c0a17378ed06exeexeexeex.exe 5020 25c0a17378ed06exeexeexeex.exe 4992 25c0a17378ed06exeexeexeex.exe 4992 25c0a17378ed06exeexeexeex.exe 4992 25c0a17378ed06exeexeexeex.exe 4992 25c0a17378ed06exeexeexeex.exe 4584 25c0a17378ed06exeexeexeex.exe 4584 25c0a17378ed06exeexeexeex.exe 4584 25c0a17378ed06exeexeexeex.exe 4584 25c0a17378ed06exeexeexeex.exe 3760 reg.exe 3760 reg.exe 3760 reg.exe 3760 reg.exe 3992 25c0a17378ed06exeexeexeex.exe 3992 25c0a17378ed06exeexeexeex.exe 3992 25c0a17378ed06exeexeexeex.exe 3992 25c0a17378ed06exeexeexeex.exe 3624 25c0a17378ed06exeexeexeex.exe 3624 25c0a17378ed06exeexeexeex.exe 3624 25c0a17378ed06exeexeexeex.exe 3624 25c0a17378ed06exeexeexeex.exe 3308 Conhost.exe 3308 Conhost.exe 3308 Conhost.exe 3308 Conhost.exe 3880 25c0a17378ed06exeexeexeex.exe 3880 25c0a17378ed06exeexeexeex.exe 3880 25c0a17378ed06exeexeexeex.exe 3880 25c0a17378ed06exeexeexeex.exe 3524 Conhost.exe 3524 Conhost.exe 3524 Conhost.exe 3524 Conhost.exe 4676 reg.exe 4676 reg.exe 4676 reg.exe 4676 reg.exe 1100 25c0a17378ed06exeexeexeex.exe 1100 25c0a17378ed06exeexeexeex.exe 1100 25c0a17378ed06exeexeexeex.exe 1100 25c0a17378ed06exeexeexeex.exe 824 25c0a17378ed06exeexeexeex.exe 824 25c0a17378ed06exeexeexeex.exe 824 25c0a17378ed06exeexeexeex.exe 824 25c0a17378ed06exeexeexeex.exe 1712 cmd.exe 1712 cmd.exe 1712 cmd.exe 1712 cmd.exe 4428 25c0a17378ed06exeexeexeex.exe 4428 25c0a17378ed06exeexeexeex.exe 4428 25c0a17378ed06exeexeexeex.exe 4428 25c0a17378ed06exeexeexeex.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 700 fGIQkEAk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe 700 fGIQkEAk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 3392 3136 25c0a17378ed06exeexeexeex.exe 83 PID 3136 wrote to memory of 3392 3136 25c0a17378ed06exeexeexeex.exe 83 PID 3136 wrote to memory of 3392 3136 25c0a17378ed06exeexeexeex.exe 83 PID 3136 wrote to memory of 700 3136 25c0a17378ed06exeexeexeex.exe 84 PID 3136 wrote to memory of 700 3136 25c0a17378ed06exeexeexeex.exe 84 PID 3136 wrote to memory of 700 3136 25c0a17378ed06exeexeexeex.exe 84 PID 3136 wrote to memory of 3356 3136 25c0a17378ed06exeexeexeex.exe 85 PID 3136 wrote to memory of 3356 3136 25c0a17378ed06exeexeexeex.exe 85 PID 3136 wrote to memory of 3356 3136 25c0a17378ed06exeexeexeex.exe 85 PID 3136 wrote to memory of 1796 3136 25c0a17378ed06exeexeexeex.exe 87 PID 3136 wrote to memory of 1796 3136 25c0a17378ed06exeexeexeex.exe 87 PID 3136 wrote to memory of 1796 3136 25c0a17378ed06exeexeexeex.exe 87 PID 3136 wrote to memory of 556 3136 25c0a17378ed06exeexeexeex.exe 91 PID 3136 wrote to memory of 556 3136 25c0a17378ed06exeexeexeex.exe 91 PID 3136 wrote to memory of 556 3136 25c0a17378ed06exeexeexeex.exe 91 PID 3136 wrote to memory of 3648 3136 25c0a17378ed06exeexeexeex.exe 89 PID 3136 wrote to memory of 3648 3136 25c0a17378ed06exeexeexeex.exe 89 PID 3136 wrote to memory of 3648 3136 25c0a17378ed06exeexeexeex.exe 89 PID 3136 wrote to memory of 3408 3136 25c0a17378ed06exeexeexeex.exe 88 PID 3136 wrote to memory of 3408 3136 25c0a17378ed06exeexeexeex.exe 88 PID 3136 wrote to memory of 3408 3136 25c0a17378ed06exeexeexeex.exe 88 PID 3356 wrote to memory of 4108 3356 cmd.exe 95 PID 3356 wrote to memory of 4108 3356 cmd.exe 95 PID 3356 wrote to memory of 4108 3356 cmd.exe 95 PID 3408 wrote to memory of 2988 3408 cmd.exe 96 PID 3408 wrote to memory of 2988 3408 cmd.exe 96 PID 3408 wrote to memory of 2988 3408 cmd.exe 96 PID 4108 wrote to memory of 1408 4108 25c0a17378ed06exeexeexeex.exe 97 PID 4108 wrote to memory of 1408 4108 25c0a17378ed06exeexeexeex.exe 97 PID 4108 wrote to memory of 1408 4108 25c0a17378ed06exeexeexeex.exe 97 PID 1408 wrote to memory of 5020 1408 cmd.exe 99 PID 1408 wrote to memory of 5020 1408 cmd.exe 99 PID 1408 wrote to memory of 5020 1408 cmd.exe 99 PID 4108 wrote to memory of 2384 4108 25c0a17378ed06exeexeexeex.exe 100 PID 4108 wrote to memory of 2384 4108 25c0a17378ed06exeexeexeex.exe 100 PID 4108 wrote to memory of 2384 4108 25c0a17378ed06exeexeexeex.exe 100 PID 4108 wrote to memory of 2264 4108 25c0a17378ed06exeexeexeex.exe 102 PID 4108 wrote to memory of 2264 4108 25c0a17378ed06exeexeexeex.exe 102 PID 4108 wrote to memory of 2264 4108 25c0a17378ed06exeexeexeex.exe 102 PID 4108 wrote to memory of 1548 4108 25c0a17378ed06exeexeexeex.exe 101 PID 4108 wrote to memory of 1548 4108 25c0a17378ed06exeexeexeex.exe 101 PID 4108 wrote to memory of 1548 4108 25c0a17378ed06exeexeexeex.exe 101 PID 4108 wrote to memory of 3720 4108 25c0a17378ed06exeexeexeex.exe 107 PID 4108 wrote to memory of 3720 4108 25c0a17378ed06exeexeexeex.exe 107 PID 4108 wrote to memory of 3720 4108 25c0a17378ed06exeexeexeex.exe 107 PID 3720 wrote to memory of 1696 3720 cmd.exe 108 PID 3720 wrote to memory of 1696 3720 cmd.exe 108 PID 3720 wrote to memory of 1696 3720 cmd.exe 108 PID 5020 wrote to memory of 4648 5020 25c0a17378ed06exeexeexeex.exe 109 PID 5020 wrote to memory of 4648 5020 25c0a17378ed06exeexeexeex.exe 109 PID 5020 wrote to memory of 4648 5020 25c0a17378ed06exeexeexeex.exe 109 PID 4648 wrote to memory of 4992 4648 cmd.exe 111 PID 4648 wrote to memory of 4992 4648 cmd.exe 111 PID 4648 wrote to memory of 4992 4648 cmd.exe 111 PID 5020 wrote to memory of 4016 5020 25c0a17378ed06exeexeexeex.exe 119 PID 5020 wrote to memory of 4016 5020 25c0a17378ed06exeexeexeex.exe 119 PID 5020 wrote to memory of 4016 5020 25c0a17378ed06exeexeexeex.exe 119 PID 5020 wrote to memory of 4280 5020 25c0a17378ed06exeexeexeex.exe 118 PID 5020 wrote to memory of 4280 5020 25c0a17378ed06exeexeexeex.exe 118 PID 5020 wrote to memory of 4280 5020 25c0a17378ed06exeexeexeex.exe 118 PID 5020 wrote to memory of 1704 5020 25c0a17378ed06exeexeexeex.exe 117 PID 5020 wrote to memory of 1704 5020 25c0a17378ed06exeexeexeex.exe 117 PID 5020 wrote to memory of 1704 5020 25c0a17378ed06exeexeexeex.exe 117 PID 5020 wrote to memory of 2952 5020 25c0a17378ed06exeexeexeex.exe 182 -
System policy modification 1 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 25c0a17378ed06exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 25c0a17378ed06exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 25c0a17378ed06exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25c0a17378ed06exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\tsgkcgkw\WQcIgUIM.exe"C:\Users\Admin\tsgkcgkw\WQcIgUIM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3392
-
-
C:\ProgramData\jecYAgUs\fGIQkEAk.exe"C:\ProgramData\jecYAgUs\fGIQkEAk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"8⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex11⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"12⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"14⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"16⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex17⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"18⤵PID:1584
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"20⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex21⤵
- Modifies visibility of file extensions in Explorer
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"22⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex23⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"24⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"26⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"28⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex29⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"30⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"32⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex33⤵PID:964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"34⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex35⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"36⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex37⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"38⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex39⤵PID:4044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"40⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex41⤵PID:3128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"42⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex43⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"44⤵
- Checks whether UAC is enabled
- System policy modification
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex45⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"46⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex47⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"48⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex49⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"50⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex51⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"52⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex53⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"54⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex55⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"56⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex57⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"58⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex59⤵PID:1428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"60⤵
- Checks whether UAC is enabled
- System policy modification
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex61⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"62⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex63⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"64⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex65⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"66⤵
- Checks whether UAC is enabled
- System policy modification
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex67⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"68⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex69⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"70⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex71⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"72⤵PID:4276
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex73⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"74⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex75⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"76⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex77⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"78⤵PID:2076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex79⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"80⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex81⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"82⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex83⤵PID:1248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"84⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex85⤵PID:3652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"86⤵PID:4644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex87⤵PID:1620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"88⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex89⤵PID:2240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"90⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex91⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"92⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex93⤵PID:1892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"94⤵PID:3172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex95⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"96⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex97⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"98⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex99⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"100⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex101⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"102⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex103⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"104⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex105⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"106⤵PID:3916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex107⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"108⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex109⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"110⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex111⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"112⤵PID:3652
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex113⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"114⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex115⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"116⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex117⤵PID:380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"118⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex119⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"120⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex121⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\25c0a17378ed06exeexeexeex"122⤵PID:3724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-