Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
84a996a9c0a556exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
84a996a9c0a556exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
84a996a9c0a556exeexeexeex.exe
-
Size
924KB
-
MD5
84a996a9c0a55690f93766fa618f35bb
-
SHA1
129fcfa22a88e34a3f2f45aab10f053c84374034
-
SHA256
7419095325efd38397dfafa713e196ded539052f4a86459b56da1b1bd2701dc6
-
SHA512
3cbd9951b62f92d44813fcc1c9a07f59cad6475c261fa6fb26501d6c0a4a431c0102e5259b31e356c49387a3dc67c89320856d0c579a0d947fe8a04204403b69
-
SSDEEP
24576:82NEVgJ4EJhUKfP0Bkd45aKEWXCUgDrMwPpmELy:8EjJVJhBIkybSUgDVhL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wmiprvse.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\UseMount.png.exe zWYgQUMA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation zWYgQUMA.exe -
Executes dropped EXE 2 IoCs
pid Process 2584 bUgMoQYk.exe 1956 zWYgQUMA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bUgMoQYk.exe = "C:\\Users\\Admin\\DCsssYQQ\\bUgMoQYk.exe" bUgMoQYk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zWYgQUMA.exe = "C:\\ProgramData\\yuwMwoYA\\zWYgQUMA.exe" zWYgQUMA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bUgMoQYk.exe = "C:\\Users\\Admin\\DCsssYQQ\\bUgMoQYk.exe" 84a996a9c0a556exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zWYgQUMA.exe = "C:\\ProgramData\\yuwMwoYA\\zWYgQUMA.exe" 84a996a9c0a556exeexeexeex.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 84a996a9c0a556exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe zWYgQUMA.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe zWYgQUMA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2240 reg.exe 908 reg.exe 2752 reg.exe 4412 reg.exe 2524 reg.exe 3384 reg.exe 4280 reg.exe 4428 reg.exe 5092 reg.exe 4836 reg.exe 4432 Process not Found 2904 reg.exe 1588 reg.exe 2168 reg.exe 312 reg.exe 1332 reg.exe 4320 reg.exe 4568 reg.exe 5012 reg.exe 848 reg.exe 3864 reg.exe 1036 reg.exe 3228 reg.exe 888 reg.exe 2012 reg.exe 2316 Process not Found 4856 reg.exe 3764 reg.exe 3880 reg.exe 4728 reg.exe 1396 reg.exe 3036 reg.exe 816 reg.exe 3524 reg.exe 3088 reg.exe 2104 reg.exe 4236 Process not Found 3652 reg.exe 1236 reg.exe 3404 reg.exe 1556 reg.exe 2032 reg.exe 4576 reg.exe 3868 reg.exe 3448 Process not Found 4896 Process not Found 4252 reg.exe 2356 reg.exe 3452 reg.exe 2752 reg.exe 1516 reg.exe 4216 reg.exe 5104 reg.exe 1692 reg.exe 1992 reg.exe 3164 reg.exe 220 reg.exe 4908 reg.exe 452 reg.exe 4184 reg.exe 3688 reg.exe 3256 Process not Found 4460 reg.exe 4412 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3764 84a996a9c0a556exeexeexeex.exe 3764 84a996a9c0a556exeexeexeex.exe 3764 84a996a9c0a556exeexeexeex.exe 3764 84a996a9c0a556exeexeexeex.exe 3356 84a996a9c0a556exeexeexeex.exe 3356 84a996a9c0a556exeexeexeex.exe 3356 84a996a9c0a556exeexeexeex.exe 3356 84a996a9c0a556exeexeexeex.exe 2548 84a996a9c0a556exeexeexeex.exe 2548 84a996a9c0a556exeexeexeex.exe 2548 84a996a9c0a556exeexeexeex.exe 2548 84a996a9c0a556exeexeexeex.exe 1980 84a996a9c0a556exeexeexeex.exe 1980 84a996a9c0a556exeexeexeex.exe 1980 84a996a9c0a556exeexeexeex.exe 1980 84a996a9c0a556exeexeexeex.exe 3284 cmd.exe 3284 cmd.exe 3284 cmd.exe 3284 cmd.exe 3164 reg.exe 3164 reg.exe 3164 reg.exe 3164 reg.exe 2252 84a996a9c0a556exeexeexeex.exe 2252 84a996a9c0a556exeexeexeex.exe 2252 84a996a9c0a556exeexeexeex.exe 2252 84a996a9c0a556exeexeexeex.exe 3680 84a996a9c0a556exeexeexeex.exe 3680 84a996a9c0a556exeexeexeex.exe 3680 84a996a9c0a556exeexeexeex.exe 3680 84a996a9c0a556exeexeexeex.exe 548 84a996a9c0a556exeexeexeex.exe 548 84a996a9c0a556exeexeexeex.exe 548 84a996a9c0a556exeexeexeex.exe 548 84a996a9c0a556exeexeexeex.exe 2636 reg.exe 2636 reg.exe 2636 reg.exe 2636 reg.exe 544 84a996a9c0a556exeexeexeex.exe 544 84a996a9c0a556exeexeexeex.exe 544 84a996a9c0a556exeexeexeex.exe 544 84a996a9c0a556exeexeexeex.exe 3760 84a996a9c0a556exeexeexeex.exe 3760 84a996a9c0a556exeexeexeex.exe 3760 84a996a9c0a556exeexeexeex.exe 3760 84a996a9c0a556exeexeexeex.exe 3788 84a996a9c0a556exeexeexeex.exe 3788 84a996a9c0a556exeexeexeex.exe 3788 84a996a9c0a556exeexeexeex.exe 3788 84a996a9c0a556exeexeexeex.exe 2368 84a996a9c0a556exeexeexeex.exe 2368 84a996a9c0a556exeexeexeex.exe 2368 84a996a9c0a556exeexeexeex.exe 2368 84a996a9c0a556exeexeexeex.exe 3244 84a996a9c0a556exeexeexeex.exe 3244 84a996a9c0a556exeexeexeex.exe 3244 84a996a9c0a556exeexeexeex.exe 3244 84a996a9c0a556exeexeexeex.exe 4872 84a996a9c0a556exeexeexeex.exe 4872 84a996a9c0a556exeexeexeex.exe 4872 84a996a9c0a556exeexeexeex.exe 4872 84a996a9c0a556exeexeexeex.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1956 zWYgQUMA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe 1956 zWYgQUMA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2584 3764 84a996a9c0a556exeexeexeex.exe 83 PID 3764 wrote to memory of 2584 3764 84a996a9c0a556exeexeexeex.exe 83 PID 3764 wrote to memory of 2584 3764 84a996a9c0a556exeexeexeex.exe 83 PID 3764 wrote to memory of 1956 3764 84a996a9c0a556exeexeexeex.exe 84 PID 3764 wrote to memory of 1956 3764 84a996a9c0a556exeexeexeex.exe 84 PID 3764 wrote to memory of 1956 3764 84a996a9c0a556exeexeexeex.exe 84 PID 3764 wrote to memory of 776 3764 84a996a9c0a556exeexeexeex.exe 85 PID 3764 wrote to memory of 776 3764 84a996a9c0a556exeexeexeex.exe 85 PID 3764 wrote to memory of 776 3764 84a996a9c0a556exeexeexeex.exe 85 PID 3764 wrote to memory of 4828 3764 84a996a9c0a556exeexeexeex.exe 87 PID 3764 wrote to memory of 4828 3764 84a996a9c0a556exeexeexeex.exe 87 PID 3764 wrote to memory of 4828 3764 84a996a9c0a556exeexeexeex.exe 87 PID 3764 wrote to memory of 636 3764 84a996a9c0a556exeexeexeex.exe 90 PID 3764 wrote to memory of 636 3764 84a996a9c0a556exeexeexeex.exe 90 PID 3764 wrote to memory of 636 3764 84a996a9c0a556exeexeexeex.exe 90 PID 3764 wrote to memory of 2524 3764 84a996a9c0a556exeexeexeex.exe 89 PID 3764 wrote to memory of 2524 3764 84a996a9c0a556exeexeexeex.exe 89 PID 3764 wrote to memory of 2524 3764 84a996a9c0a556exeexeexeex.exe 89 PID 3764 wrote to memory of 4316 3764 84a996a9c0a556exeexeexeex.exe 88 PID 3764 wrote to memory of 4316 3764 84a996a9c0a556exeexeexeex.exe 88 PID 3764 wrote to memory of 4316 3764 84a996a9c0a556exeexeexeex.exe 88 PID 776 wrote to memory of 3356 776 cmd.exe 96 PID 776 wrote to memory of 3356 776 cmd.exe 96 PID 776 wrote to memory of 3356 776 cmd.exe 96 PID 4316 wrote to memory of 4564 4316 cmd.exe 97 PID 4316 wrote to memory of 4564 4316 cmd.exe 97 PID 4316 wrote to memory of 4564 4316 cmd.exe 97 PID 3356 wrote to memory of 2608 3356 84a996a9c0a556exeexeexeex.exe 98 PID 3356 wrote to memory of 2608 3356 84a996a9c0a556exeexeexeex.exe 98 PID 3356 wrote to memory of 2608 3356 84a996a9c0a556exeexeexeex.exe 98 PID 3356 wrote to memory of 1268 3356 84a996a9c0a556exeexeexeex.exe 100 PID 3356 wrote to memory of 1268 3356 84a996a9c0a556exeexeexeex.exe 100 PID 3356 wrote to memory of 1268 3356 84a996a9c0a556exeexeexeex.exe 100 PID 3356 wrote to memory of 1692 3356 84a996a9c0a556exeexeexeex.exe 104 PID 3356 wrote to memory of 1692 3356 84a996a9c0a556exeexeexeex.exe 104 PID 3356 wrote to memory of 1692 3356 84a996a9c0a556exeexeexeex.exe 104 PID 3356 wrote to memory of 4568 3356 84a996a9c0a556exeexeexeex.exe 103 PID 3356 wrote to memory of 4568 3356 84a996a9c0a556exeexeexeex.exe 103 PID 3356 wrote to memory of 4568 3356 84a996a9c0a556exeexeexeex.exe 103 PID 3356 wrote to memory of 1424 3356 84a996a9c0a556exeexeexeex.exe 101 PID 3356 wrote to memory of 1424 3356 84a996a9c0a556exeexeexeex.exe 101 PID 3356 wrote to memory of 1424 3356 84a996a9c0a556exeexeexeex.exe 101 PID 2608 wrote to memory of 2548 2608 cmd.exe 108 PID 2608 wrote to memory of 2548 2608 cmd.exe 108 PID 2608 wrote to memory of 2548 2608 cmd.exe 108 PID 1424 wrote to memory of 3948 1424 cmd.exe 109 PID 1424 wrote to memory of 3948 1424 cmd.exe 109 PID 1424 wrote to memory of 3948 1424 cmd.exe 109 PID 2548 wrote to memory of 216 2548 84a996a9c0a556exeexeexeex.exe 110 PID 2548 wrote to memory of 216 2548 84a996a9c0a556exeexeexeex.exe 110 PID 2548 wrote to memory of 216 2548 84a996a9c0a556exeexeexeex.exe 110 PID 216 wrote to memory of 1980 216 cmd.exe 112 PID 216 wrote to memory of 1980 216 cmd.exe 112 PID 216 wrote to memory of 1980 216 cmd.exe 112 PID 2548 wrote to memory of 4460 2548 84a996a9c0a556exeexeexeex.exe 113 PID 2548 wrote to memory of 4460 2548 84a996a9c0a556exeexeexeex.exe 113 PID 2548 wrote to memory of 4460 2548 84a996a9c0a556exeexeexeex.exe 113 PID 2548 wrote to memory of 2032 2548 84a996a9c0a556exeexeexeex.exe 114 PID 2548 wrote to memory of 2032 2548 84a996a9c0a556exeexeexeex.exe 114 PID 2548 wrote to memory of 2032 2548 84a996a9c0a556exeexeexeex.exe 114 PID 2548 wrote to memory of 1176 2548 84a996a9c0a556exeexeexeex.exe 115 PID 2548 wrote to memory of 1176 2548 84a996a9c0a556exeexeexeex.exe 115 PID 2548 wrote to memory of 1176 2548 84a996a9c0a556exeexeexeex.exe 115 PID 2548 wrote to memory of 1468 2548 84a996a9c0a556exeexeexeex.exe 116 -
System policy modification 1 TTPs 54 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84a996a9c0a556exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 84a996a9c0a556exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\DCsssYQQ\bUgMoQYk.exe"C:\Users\Admin\DCsssYQQ\bUgMoQYk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2584
-
-
C:\ProgramData\yuwMwoYA\zWYgQUMA.exe"C:\ProgramData\yuwMwoYA\zWYgQUMA.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"8⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex9⤵PID:3284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"10⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex11⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"12⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"14⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"16⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"18⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex19⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"20⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"22⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"24⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"26⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex27⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"28⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"30⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"32⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex33⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"34⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex35⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"36⤵PID:3564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:420
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex37⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"38⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex39⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"40⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex41⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"42⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex43⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"44⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex45⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"46⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex47⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"48⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex49⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"50⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex51⤵PID:468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"52⤵PID:2948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
- UAC bypass
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex53⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"54⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex55⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"56⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex57⤵PID:2068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"58⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex59⤵PID:632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"60⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"62⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex63⤵PID:4656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"64⤵PID:4224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex65⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"66⤵PID:4508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex67⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"68⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex69⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"70⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex71⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"72⤵PID:2904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex73⤵
- Checks whether UAC is enabled
- System policy modification
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"74⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex75⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"76⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex77⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"78⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex79⤵PID:3420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"80⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex81⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"82⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- Modifies visibility of file extensions in Explorer
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex83⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"84⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex85⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"86⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex87⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"88⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex89⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"90⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex91⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"92⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex93⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"94⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex95⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"96⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex97⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"98⤵PID:3428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex99⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"100⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex101⤵PID:1668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"102⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex103⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"104⤵PID:4508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex105⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"106⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex107⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"108⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex109⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"110⤵PID:2520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex111⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"112⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex113⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"114⤵PID:2740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex115⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"116⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex117⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"118⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex119⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"120⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex121⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\84a996a9c0a556exeexeexeex"122⤵PID:3092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-