Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
5cdfaad20cdf58exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
5cdfaad20cdf58exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5cdfaad20cdf58exeexeexeex.exe
-
Size
334KB
-
MD5
5cdfaad20cdf5895477b8dd451a38b76
-
SHA1
f59d1bc399d988d5d5169e7df09b8e57589c1127
-
SHA256
1fbfc0b007a6e3e6d21635f4fc6862f73193a94eb54ca6561eb8de30ede2b155
-
SHA512
78229d6cd0432671aa91a770a95b97691376d1283a6ad4be59cb01eb439e987eb87f341405fe54889f6e2957fe874c6940d53ade0dcaf0be7698a634b86828d1
-
SSDEEP
6144:lv3XLrZ99999999999999X99999999999999X99999999999999X99999999999j:NnLrZ99999999999999X99999999999D
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 40 5092 cscript.exe 43 5092 cscript.exe 47 5092 cscript.exe 48 5092 cscript.exe 50 5092 cscript.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\LimitCompare.png.exe miogkgAA.exe File created C:\Users\Admin\Pictures\RestoreBackup.png.exe miogkgAA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation miogkgAA.exe -
Executes dropped EXE 2 IoCs
pid Process 3092 miogkgAA.exe 456 BAAAgIQo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miogkgAA.exe = "C:\\Users\\Admin\\oqQAAYYw\\miogkgAA.exe" 5cdfaad20cdf58exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BAAAgIQo.exe = "C:\\ProgramData\\DMcMcIAY\\BAAAgIQo.exe" 5cdfaad20cdf58exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BAAAgIQo.exe = "C:\\ProgramData\\DMcMcIAY\\BAAAgIQo.exe" BAAAgIQo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miogkgAA.exe = "C:\\Users\\Admin\\oqQAAYYw\\miogkgAA.exe" miogkgAA.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe miogkgAA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4720 reg.exe 3688 reg.exe 2140 reg.exe 2684 reg.exe 4748 reg.exe 4856 Process not Found 2036 reg.exe 5060 reg.exe 3344 reg.exe 672 reg.exe 2684 reg.exe 5108 reg.exe 4384 reg.exe 1484 reg.exe 2720 reg.exe 1836 reg.exe 1020 reg.exe 4444 reg.exe 3200 reg.exe 4368 reg.exe 2740 reg.exe 3948 reg.exe 1196 reg.exe 3500 reg.exe 1720 reg.exe 3508 reg.exe 4688 reg.exe 1520 reg.exe 1596 reg.exe 3120 reg.exe 2240 reg.exe 3620 reg.exe 4444 reg.exe 2240 reg.exe 3348 reg.exe 1268 reg.exe 936 reg.exe 2112 reg.exe 1192 reg.exe 1680 reg.exe 1068 reg.exe 916 reg.exe 3256 reg.exe 752 reg.exe 3284 reg.exe 1348 reg.exe 4020 reg.exe 988 reg.exe 4752 reg.exe 4020 reg.exe 4648 Process not Found 2140 reg.exe 960 reg.exe 4060 reg.exe 4116 reg.exe 2340 reg.exe 2900 Process not Found 5004 reg.exe 1388 reg.exe 4860 reg.exe 3872 reg.exe 4948 reg.exe 3348 reg.exe 2320 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1332 5cdfaad20cdf58exeexeexeex.exe 1332 5cdfaad20cdf58exeexeexeex.exe 1332 5cdfaad20cdf58exeexeexeex.exe 1332 5cdfaad20cdf58exeexeexeex.exe 2980 5cdfaad20cdf58exeexeexeex.exe 2980 5cdfaad20cdf58exeexeexeex.exe 2980 5cdfaad20cdf58exeexeexeex.exe 2980 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2548 5cdfaad20cdf58exeexeexeex.exe 2548 5cdfaad20cdf58exeexeexeex.exe 2548 5cdfaad20cdf58exeexeexeex.exe 2548 5cdfaad20cdf58exeexeexeex.exe 4144 Process not Found 4144 Process not Found 4144 Process not Found 4144 Process not Found 4984 Conhost.exe 4984 Conhost.exe 4984 Conhost.exe 4984 Conhost.exe 2340 reg.exe 2340 reg.exe 2340 reg.exe 2340 reg.exe 4676 5cdfaad20cdf58exeexeexeex.exe 4676 5cdfaad20cdf58exeexeexeex.exe 4676 5cdfaad20cdf58exeexeexeex.exe 4676 5cdfaad20cdf58exeexeexeex.exe 3584 5cdfaad20cdf58exeexeexeex.exe 3584 5cdfaad20cdf58exeexeexeex.exe 3584 5cdfaad20cdf58exeexeexeex.exe 3584 5cdfaad20cdf58exeexeexeex.exe 3688 5cdfaad20cdf58exeexeexeex.exe 3688 5cdfaad20cdf58exeexeexeex.exe 3688 5cdfaad20cdf58exeexeexeex.exe 3688 5cdfaad20cdf58exeexeexeex.exe 1556 Process not Found 1556 Process not Found 1556 Process not Found 1556 Process not Found 3760 5cdfaad20cdf58exeexeexeex.exe 3760 5cdfaad20cdf58exeexeexeex.exe 3760 5cdfaad20cdf58exeexeexeex.exe 3760 5cdfaad20cdf58exeexeexeex.exe 1192 Conhost.exe 1192 Conhost.exe 1192 Conhost.exe 1192 Conhost.exe 4872 reg.exe 4872 reg.exe 4872 reg.exe 4872 reg.exe 3188 reg.exe 3188 reg.exe 3188 reg.exe 3188 reg.exe 4952 reg.exe 4952 reg.exe 4952 reg.exe 4952 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3092 miogkgAA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe 3092 miogkgAA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 3092 1332 5cdfaad20cdf58exeexeexeex.exe 85 PID 1332 wrote to memory of 3092 1332 5cdfaad20cdf58exeexeexeex.exe 85 PID 1332 wrote to memory of 3092 1332 5cdfaad20cdf58exeexeexeex.exe 85 PID 1332 wrote to memory of 456 1332 5cdfaad20cdf58exeexeexeex.exe 86 PID 1332 wrote to memory of 456 1332 5cdfaad20cdf58exeexeexeex.exe 86 PID 1332 wrote to memory of 456 1332 5cdfaad20cdf58exeexeexeex.exe 86 PID 1332 wrote to memory of 3524 1332 5cdfaad20cdf58exeexeexeex.exe 88 PID 1332 wrote to memory of 3524 1332 5cdfaad20cdf58exeexeexeex.exe 88 PID 1332 wrote to memory of 3524 1332 5cdfaad20cdf58exeexeexeex.exe 88 PID 1332 wrote to memory of 5000 1332 5cdfaad20cdf58exeexeexeex.exe 90 PID 1332 wrote to memory of 5000 1332 5cdfaad20cdf58exeexeexeex.exe 90 PID 1332 wrote to memory of 5000 1332 5cdfaad20cdf58exeexeexeex.exe 90 PID 1332 wrote to memory of 4424 1332 5cdfaad20cdf58exeexeexeex.exe 89 PID 1332 wrote to memory of 4424 1332 5cdfaad20cdf58exeexeexeex.exe 89 PID 1332 wrote to memory of 4424 1332 5cdfaad20cdf58exeexeexeex.exe 89 PID 1332 wrote to memory of 4324 1332 5cdfaad20cdf58exeexeexeex.exe 91 PID 1332 wrote to memory of 4324 1332 5cdfaad20cdf58exeexeexeex.exe 91 PID 1332 wrote to memory of 4324 1332 5cdfaad20cdf58exeexeexeex.exe 91 PID 1332 wrote to memory of 1080 1332 5cdfaad20cdf58exeexeexeex.exe 92 PID 1332 wrote to memory of 1080 1332 5cdfaad20cdf58exeexeexeex.exe 92 PID 1332 wrote to memory of 1080 1332 5cdfaad20cdf58exeexeexeex.exe 92 PID 3524 wrote to memory of 2980 3524 cmd.exe 96 PID 3524 wrote to memory of 2980 3524 cmd.exe 96 PID 3524 wrote to memory of 2980 3524 cmd.exe 96 PID 2980 wrote to memory of 108 2980 5cdfaad20cdf58exeexeexeex.exe 98 PID 2980 wrote to memory of 108 2980 5cdfaad20cdf58exeexeexeex.exe 98 PID 2980 wrote to memory of 108 2980 5cdfaad20cdf58exeexeexeex.exe 98 PID 1080 wrote to memory of 208 1080 cmd.exe 100 PID 1080 wrote to memory of 208 1080 cmd.exe 100 PID 1080 wrote to memory of 208 1080 cmd.exe 100 PID 2980 wrote to memory of 1636 2980 5cdfaad20cdf58exeexeexeex.exe 102 PID 2980 wrote to memory of 1636 2980 5cdfaad20cdf58exeexeexeex.exe 102 PID 2980 wrote to memory of 1636 2980 5cdfaad20cdf58exeexeexeex.exe 102 PID 2980 wrote to memory of 4612 2980 5cdfaad20cdf58exeexeexeex.exe 101 PID 2980 wrote to memory of 4612 2980 5cdfaad20cdf58exeexeexeex.exe 101 PID 2980 wrote to memory of 4612 2980 5cdfaad20cdf58exeexeexeex.exe 101 PID 2980 wrote to memory of 3684 2980 5cdfaad20cdf58exeexeexeex.exe 103 PID 2980 wrote to memory of 3684 2980 5cdfaad20cdf58exeexeexeex.exe 103 PID 2980 wrote to memory of 3684 2980 5cdfaad20cdf58exeexeexeex.exe 103 PID 2980 wrote to memory of 4848 2980 5cdfaad20cdf58exeexeexeex.exe 104 PID 2980 wrote to memory of 4848 2980 5cdfaad20cdf58exeexeexeex.exe 104 PID 2980 wrote to memory of 4848 2980 5cdfaad20cdf58exeexeexeex.exe 104 PID 108 wrote to memory of 2716 108 cmd.exe 109 PID 108 wrote to memory of 2716 108 cmd.exe 109 PID 108 wrote to memory of 2716 108 cmd.exe 109 PID 4848 wrote to memory of 4680 4848 cmd.exe 110 PID 4848 wrote to memory of 4680 4848 cmd.exe 110 PID 4848 wrote to memory of 4680 4848 cmd.exe 110 PID 2716 wrote to memory of 2864 2716 5cdfaad20cdf58exeexeexeex.exe 111 PID 2716 wrote to memory of 2864 2716 5cdfaad20cdf58exeexeexeex.exe 111 PID 2716 wrote to memory of 2864 2716 5cdfaad20cdf58exeexeexeex.exe 111 PID 2716 wrote to memory of 3172 2716 5cdfaad20cdf58exeexeexeex.exe 116 PID 2716 wrote to memory of 3172 2716 5cdfaad20cdf58exeexeexeex.exe 116 PID 2716 wrote to memory of 3172 2716 5cdfaad20cdf58exeexeexeex.exe 116 PID 2716 wrote to memory of 4320 2716 5cdfaad20cdf58exeexeexeex.exe 115 PID 2716 wrote to memory of 4320 2716 5cdfaad20cdf58exeexeexeex.exe 115 PID 2716 wrote to memory of 4320 2716 5cdfaad20cdf58exeexeexeex.exe 115 PID 2716 wrote to memory of 4384 2716 5cdfaad20cdf58exeexeexeex.exe 114 PID 2716 wrote to memory of 4384 2716 5cdfaad20cdf58exeexeexeex.exe 114 PID 2716 wrote to memory of 4384 2716 5cdfaad20cdf58exeexeexeex.exe 114 PID 2716 wrote to memory of 852 2716 5cdfaad20cdf58exeexeexeex.exe 175 PID 2716 wrote to memory of 852 2716 5cdfaad20cdf58exeexeexeex.exe 175 PID 2716 wrote to memory of 852 2716 5cdfaad20cdf58exeexeexeex.exe 175 PID 2864 wrote to memory of 2548 2864 cmd.exe 121 -
System policy modification 1 TTPs 56 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5cdfaad20cdf58exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5cdfaad20cdf58exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\oqQAAYYw\miogkgAA.exe"C:\Users\Admin\oqQAAYYw\miogkgAA.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3092
-
-
C:\ProgramData\DMcMcIAY\BAAAgIQo.exe"C:\ProgramData\DMcMcIAY\BAAAgIQo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"8⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex9⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"10⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex11⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"12⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex13⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"14⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"16⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"18⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"20⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex21⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"22⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"24⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex25⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"26⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex27⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"28⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex29⤵PID:3188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"30⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex31⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"32⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex33⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"34⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex35⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"36⤵PID:4716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex37⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"38⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex39⤵PID:3188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"40⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex41⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"42⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex43⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"44⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex45⤵
- Checks whether UAC is enabled
- System policy modification
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"46⤵
- Checks whether UAC is enabled
- System policy modification
PID:2056 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex47⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"48⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex49⤵PID:976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"50⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex51⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"52⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex53⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"54⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex55⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"56⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex57⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"58⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex59⤵
- Modifies visibility of file extensions in Explorer
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"60⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex61⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"62⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex63⤵PID:1840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"64⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex65⤵
- Modifies visibility of file extensions in Explorer
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"66⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex67⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"68⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex69⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"70⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex71⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"72⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex73⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"74⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex75⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"76⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex77⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"78⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex79⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"80⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex81⤵PID:864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"82⤵PID:4792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- UAC bypass
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex83⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"84⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex85⤵PID:916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"86⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex87⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"88⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex89⤵PID:976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"90⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex91⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"92⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex93⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"94⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex95⤵
- Modifies visibility of file extensions in Explorer
PID:1828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"96⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex97⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"98⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex99⤵PID:3348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"100⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex101⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"102⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex103⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"104⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex105⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"106⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex107⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"108⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex109⤵PID:408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"110⤵
- Modifies visibility of file extensions in Explorer
PID:2864 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex111⤵PID:1120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"112⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex113⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"114⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex115⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"116⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex117⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"118⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex119⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"120⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex121⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"122⤵PID:976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-