Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
a4ab2c140478c5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a4ab2c140478c5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
a4ab2c140478c5exeexeexeex.exe
-
Size
199KB
-
MD5
a4ab2c140478c54f3af92cb9c1dfba7a
-
SHA1
4f77f4908a93202839fd145cfc95aca009d34a1a
-
SHA256
71f3b7cc913ba175a709447b8127781dc8b2e34479cec84dd9b32a2ba972d9ae
-
SHA512
5d5e5bd422d921b73ac1c5c98cd17823bb65a0eed9b1031dfe807dd5a451284cd62d91738ba355ca2353b4ae43c240334139c034d6274e4da7c22038896e9bcf
-
SSDEEP
3072:LUGyiS7dgq2hMeQYwIex/5Es8vEWFwjFKtG8Udq6hlxCo:L9adg/wIe16WJjFQUdthGo
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" DllHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a4ab2c140478c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 20 552 cmd.exe 23 552 cmd.exe 26 552 cmd.exe 27 552 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation ZwEcAgMM.exe -
Executes dropped EXE 2 IoCs
pid Process 4016 ZwEcAgMM.exe 3388 SCYEwwkQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZwEcAgMM.exe = "C:\\Users\\Admin\\rMEsQYsw\\ZwEcAgMM.exe" a4ab2c140478c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SCYEwwkQ.exe = "C:\\ProgramData\\AegosYsA\\SCYEwwkQ.exe" a4ab2c140478c5exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZwEcAgMM.exe = "C:\\Users\\Admin\\rMEsQYsw\\ZwEcAgMM.exe" ZwEcAgMM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SCYEwwkQ.exe = "C:\\ProgramData\\AegosYsA\\SCYEwwkQ.exe" SCYEwwkQ.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a4ab2c140478c5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a4ab2c140478c5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe ZwEcAgMM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1400 reg.exe 2032 reg.exe 2296 reg.exe 3936 reg.exe 4508 reg.exe 4400 reg.exe 2152 reg.exe 4608 reg.exe 4608 reg.exe 1140 reg.exe 464 Process not Found 1320 Process not Found 4812 Process not Found 4600 reg.exe 896 reg.exe 4956 reg.exe 2112 reg.exe 3696 reg.exe 3548 Process not Found 644 Process not Found 1912 Process not Found 1400 reg.exe 4120 reg.exe 5056 reg.exe 3848 reg.exe 2680 reg.exe 780 reg.exe 3288 reg.exe 1496 reg.exe 2872 reg.exe 1244 Process not Found 4472 reg.exe 2324 reg.exe 1028 reg.exe 4864 reg.exe 4752 reg.exe 3964 reg.exe 4984 reg.exe 452 reg.exe 2816 reg.exe 3164 reg.exe 3840 reg.exe 1208 reg.exe 2660 Process not Found 4696 reg.exe 928 reg.exe 3004 reg.exe 4348 reg.exe 2816 reg.exe 516 reg.exe 4028 reg.exe 2884 reg.exe 3864 reg.exe 1908 reg.exe 4620 reg.exe 3356 Process not Found 2156 reg.exe 408 reg.exe 2144 reg.exe 4520 reg.exe 4844 reg.exe 1852 reg.exe 4620 reg.exe 3432 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 a4ab2c140478c5exeexeexeex.exe 2936 a4ab2c140478c5exeexeexeex.exe 2936 a4ab2c140478c5exeexeexeex.exe 2936 a4ab2c140478c5exeexeexeex.exe 3044 a4ab2c140478c5exeexeexeex.exe 3044 a4ab2c140478c5exeexeexeex.exe 3044 a4ab2c140478c5exeexeexeex.exe 3044 a4ab2c140478c5exeexeexeex.exe 4564 a4ab2c140478c5exeexeexeex.exe 4564 a4ab2c140478c5exeexeexeex.exe 4564 a4ab2c140478c5exeexeexeex.exe 4564 a4ab2c140478c5exeexeexeex.exe 3364 a4ab2c140478c5exeexeexeex.exe 3364 a4ab2c140478c5exeexeexeex.exe 3364 a4ab2c140478c5exeexeexeex.exe 3364 a4ab2c140478c5exeexeexeex.exe 4860 a4ab2c140478c5exeexeexeex.exe 4860 a4ab2c140478c5exeexeexeex.exe 4860 a4ab2c140478c5exeexeexeex.exe 4860 a4ab2c140478c5exeexeexeex.exe 4024 a4ab2c140478c5exeexeexeex.exe 4024 a4ab2c140478c5exeexeexeex.exe 4024 a4ab2c140478c5exeexeexeex.exe 4024 a4ab2c140478c5exeexeexeex.exe 1600 a4ab2c140478c5exeexeexeex.exe 1600 a4ab2c140478c5exeexeexeex.exe 1600 a4ab2c140478c5exeexeexeex.exe 1600 a4ab2c140478c5exeexeexeex.exe 4812 a4ab2c140478c5exeexeexeex.exe 4812 a4ab2c140478c5exeexeexeex.exe 4812 a4ab2c140478c5exeexeexeex.exe 4812 a4ab2c140478c5exeexeexeex.exe 2764 a4ab2c140478c5exeexeexeex.exe 2764 a4ab2c140478c5exeexeexeex.exe 2764 a4ab2c140478c5exeexeexeex.exe 2764 a4ab2c140478c5exeexeexeex.exe 4608 a4ab2c140478c5exeexeexeex.exe 4608 a4ab2c140478c5exeexeexeex.exe 4608 a4ab2c140478c5exeexeexeex.exe 4608 a4ab2c140478c5exeexeexeex.exe 1248 a4ab2c140478c5exeexeexeex.exe 1248 a4ab2c140478c5exeexeexeex.exe 1248 a4ab2c140478c5exeexeexeex.exe 1248 a4ab2c140478c5exeexeexeex.exe 524 a4ab2c140478c5exeexeexeex.exe 524 a4ab2c140478c5exeexeexeex.exe 524 a4ab2c140478c5exeexeexeex.exe 524 a4ab2c140478c5exeexeexeex.exe 4684 Conhost.exe 4684 Conhost.exe 4684 Conhost.exe 4684 Conhost.exe 8 a4ab2c140478c5exeexeexeex.exe 8 a4ab2c140478c5exeexeexeex.exe 8 a4ab2c140478c5exeexeexeex.exe 8 a4ab2c140478c5exeexeexeex.exe 1644 a4ab2c140478c5exeexeexeex.exe 1644 a4ab2c140478c5exeexeexeex.exe 1644 a4ab2c140478c5exeexeexeex.exe 1644 a4ab2c140478c5exeexeexeex.exe 3368 Conhost.exe 3368 Conhost.exe 3368 Conhost.exe 3368 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4016 ZwEcAgMM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe 4016 ZwEcAgMM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 4016 2936 a4ab2c140478c5exeexeexeex.exe 84 PID 2936 wrote to memory of 4016 2936 a4ab2c140478c5exeexeexeex.exe 84 PID 2936 wrote to memory of 4016 2936 a4ab2c140478c5exeexeexeex.exe 84 PID 2936 wrote to memory of 3388 2936 a4ab2c140478c5exeexeexeex.exe 85 PID 2936 wrote to memory of 3388 2936 a4ab2c140478c5exeexeexeex.exe 85 PID 2936 wrote to memory of 3388 2936 a4ab2c140478c5exeexeexeex.exe 85 PID 2936 wrote to memory of 3568 2936 a4ab2c140478c5exeexeexeex.exe 86 PID 2936 wrote to memory of 3568 2936 a4ab2c140478c5exeexeexeex.exe 86 PID 2936 wrote to memory of 3568 2936 a4ab2c140478c5exeexeexeex.exe 86 PID 2936 wrote to memory of 1912 2936 a4ab2c140478c5exeexeexeex.exe 91 PID 2936 wrote to memory of 1912 2936 a4ab2c140478c5exeexeexeex.exe 91 PID 2936 wrote to memory of 1912 2936 a4ab2c140478c5exeexeexeex.exe 91 PID 2936 wrote to memory of 3184 2936 a4ab2c140478c5exeexeexeex.exe 90 PID 2936 wrote to memory of 3184 2936 a4ab2c140478c5exeexeexeex.exe 90 PID 2936 wrote to memory of 3184 2936 a4ab2c140478c5exeexeexeex.exe 90 PID 2936 wrote to memory of 3032 2936 a4ab2c140478c5exeexeexeex.exe 89 PID 2936 wrote to memory of 3032 2936 a4ab2c140478c5exeexeexeex.exe 89 PID 2936 wrote to memory of 3032 2936 a4ab2c140478c5exeexeexeex.exe 89 PID 2936 wrote to memory of 4928 2936 a4ab2c140478c5exeexeexeex.exe 88 PID 2936 wrote to memory of 4928 2936 a4ab2c140478c5exeexeexeex.exe 88 PID 2936 wrote to memory of 4928 2936 a4ab2c140478c5exeexeexeex.exe 88 PID 3568 wrote to memory of 3044 3568 cmd.exe 96 PID 3568 wrote to memory of 3044 3568 cmd.exe 96 PID 3568 wrote to memory of 3044 3568 cmd.exe 96 PID 4928 wrote to memory of 4084 4928 cmd.exe 97 PID 4928 wrote to memory of 4084 4928 cmd.exe 97 PID 4928 wrote to memory of 4084 4928 cmd.exe 97 PID 3044 wrote to memory of 640 3044 a4ab2c140478c5exeexeexeex.exe 98 PID 3044 wrote to memory of 640 3044 a4ab2c140478c5exeexeexeex.exe 98 PID 3044 wrote to memory of 640 3044 a4ab2c140478c5exeexeexeex.exe 98 PID 3044 wrote to memory of 4380 3044 a4ab2c140478c5exeexeexeex.exe 100 PID 3044 wrote to memory of 4380 3044 a4ab2c140478c5exeexeexeex.exe 100 PID 3044 wrote to memory of 4380 3044 a4ab2c140478c5exeexeexeex.exe 100 PID 3044 wrote to memory of 3048 3044 a4ab2c140478c5exeexeexeex.exe 107 PID 3044 wrote to memory of 3048 3044 a4ab2c140478c5exeexeexeex.exe 107 PID 3044 wrote to memory of 3048 3044 a4ab2c140478c5exeexeexeex.exe 107 PID 3044 wrote to memory of 1852 3044 a4ab2c140478c5exeexeexeex.exe 102 PID 3044 wrote to memory of 1852 3044 a4ab2c140478c5exeexeexeex.exe 102 PID 3044 wrote to memory of 1852 3044 a4ab2c140478c5exeexeexeex.exe 102 PID 3044 wrote to memory of 4612 3044 a4ab2c140478c5exeexeexeex.exe 101 PID 3044 wrote to memory of 4612 3044 a4ab2c140478c5exeexeexeex.exe 101 PID 3044 wrote to memory of 4612 3044 a4ab2c140478c5exeexeexeex.exe 101 PID 640 wrote to memory of 4564 640 cmd.exe 108 PID 640 wrote to memory of 4564 640 cmd.exe 108 PID 640 wrote to memory of 4564 640 cmd.exe 108 PID 4612 wrote to memory of 3500 4612 cmd.exe 109 PID 4612 wrote to memory of 3500 4612 cmd.exe 109 PID 4612 wrote to memory of 3500 4612 cmd.exe 109 PID 4564 wrote to memory of 2300 4564 a4ab2c140478c5exeexeexeex.exe 110 PID 4564 wrote to memory of 2300 4564 a4ab2c140478c5exeexeexeex.exe 110 PID 4564 wrote to memory of 2300 4564 a4ab2c140478c5exeexeexeex.exe 110 PID 4564 wrote to memory of 4864 4564 a4ab2c140478c5exeexeexeex.exe 112 PID 4564 wrote to memory of 4864 4564 a4ab2c140478c5exeexeexeex.exe 112 PID 4564 wrote to memory of 4864 4564 a4ab2c140478c5exeexeexeex.exe 112 PID 4564 wrote to memory of 3592 4564 a4ab2c140478c5exeexeexeex.exe 113 PID 4564 wrote to memory of 3592 4564 a4ab2c140478c5exeexeexeex.exe 113 PID 4564 wrote to memory of 3592 4564 a4ab2c140478c5exeexeexeex.exe 113 PID 4564 wrote to memory of 1704 4564 a4ab2c140478c5exeexeexeex.exe 114 PID 4564 wrote to memory of 1704 4564 a4ab2c140478c5exeexeexeex.exe 114 PID 4564 wrote to memory of 1704 4564 a4ab2c140478c5exeexeexeex.exe 114 PID 4564 wrote to memory of 1808 4564 a4ab2c140478c5exeexeexeex.exe 115 PID 4564 wrote to memory of 1808 4564 a4ab2c140478c5exeexeexeex.exe 115 PID 4564 wrote to memory of 1808 4564 a4ab2c140478c5exeexeexeex.exe 115 PID 2300 wrote to memory of 3364 2300 cmd.exe 117 -
System policy modification 1 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a4ab2c140478c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a4ab2c140478c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\rMEsQYsw\ZwEcAgMM.exe"C:\Users\Admin\rMEsQYsw\ZwEcAgMM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4016
-
-
C:\ProgramData\AegosYsA\SCYEwwkQ.exe"C:\ProgramData\AegosYsA\SCYEwwkQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"8⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"10⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"12⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"14⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex15⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"16⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"18⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"20⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"22⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"24⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex25⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"26⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"28⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"30⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex31⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"32⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex33⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"34⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"36⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex37⤵PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"38⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex39⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"40⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex41⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"42⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex43⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"44⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex45⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"46⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex47⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"48⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex49⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"50⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex51⤵
- Modifies visibility of file extensions in Explorer
PID:3140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"52⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex53⤵
- Modifies visibility of file extensions in Explorer
PID:4120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"54⤵PID:1244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex55⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"56⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex57⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"58⤵PID:1676
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex59⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"60⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex61⤵PID:792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"62⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex63⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"64⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex65⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"66⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex67⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"68⤵PID:3620
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex69⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"70⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex71⤵PID:1128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"72⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex73⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"74⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex75⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"76⤵
- Checks whether UAC is enabled
- System policy modification
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex77⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"78⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex79⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"80⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex81⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"82⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex83⤵PID:516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"84⤵PID:4220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
- UAC bypass
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex85⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"86⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex87⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"88⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex89⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"90⤵PID:4708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex91⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"92⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex93⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"94⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex95⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"96⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex97⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"98⤵PID:3204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex99⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"100⤵PID:4904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex101⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"102⤵PID:5072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex103⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"104⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex105⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"106⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex107⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"108⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex109⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"110⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex111⤵PID:3152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"112⤵PID:2192
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵
- Modifies visibility of file extensions in Explorer
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex113⤵PID:952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"114⤵
- Checks whether UAC is enabled
- System policy modification
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex115⤵
- Modifies visibility of file extensions in Explorer
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"116⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex117⤵PID:1428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"118⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex119⤵PID:760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"120⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex121⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a4ab2c140478c5exeexeexeex"122⤵PID:2408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-