Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d5d7c65b0c09f3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d5d7c65b0c09f3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d5d7c65b0c09f3exeexeexeex.exe
-
Size
187KB
-
MD5
d5d7c65b0c09f363d0b4736db6512738
-
SHA1
32c220f69b60ede71966b32fc7f8ce4bda8fc3e8
-
SHA256
a3e9e59b9da539a8b7ce869d598ccff75060b6e0cf136552b31dee2cd1bcea1a
-
SHA512
082ff2b6d1d8e38b93aa1a0a41fa27260c8d8181551eb287f1c9b550c0a8ed96263e8b0f5ebe98d2928c55f0781d6d9718f083f1b8de8dc2965d72f80253000b
-
SSDEEP
3072:iqe5+e4kXedsW3lVWDnzE1Q6KWKVy+T8T4Ti2T7TATATITbTTUTTI69FKKrtuVu8:OAe4pqzE1QDXFT8T4Ti2T7TATATITbTb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation DQcIQUQg.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 UGcsYQMY.exe 464 DQcIQUQg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DQcIQUQg.exe = "C:\\ProgramData\\GgEYgogM\\DQcIQUQg.exe" d5d7c65b0c09f3exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DQcIQUQg.exe = "C:\\ProgramData\\GgEYgogM\\DQcIQUQg.exe" DQcIQUQg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UGcsYQMY.exe = "C:\\Users\\Admin\\pYgEsYsU\\UGcsYQMY.exe" UGcsYQMY.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UGcsYQMY.exe = "C:\\Users\\Admin\\pYgEsYsU\\UGcsYQMY.exe" d5d7c65b0c09f3exeexeexeex.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5d7c65b0c09f3exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2796 reg.exe 1400 reg.exe 1212 reg.exe 1924 reg.exe 4688 reg.exe 3372 reg.exe 5084 reg.exe 4080 Process not Found 8 reg.exe 732 reg.exe 3816 reg.exe 428 reg.exe 3088 reg.exe 4840 reg.exe 2876 Process not Found 3044 reg.exe 2152 reg.exe 3704 reg.exe 2772 Process not Found 4508 reg.exe 2612 reg.exe 3404 reg.exe 4980 reg.exe 2704 Process not Found 2328 reg.exe 4436 reg.exe 2944 reg.exe 4704 reg.exe 892 reg.exe 4120 reg.exe 3420 reg.exe 3624 Process not Found 1632 reg.exe 4124 reg.exe 1980 reg.exe 376 reg.exe 1404 reg.exe 2784 reg.exe 4480 reg.exe 2040 Process not Found 2152 reg.exe 4300 reg.exe 3604 reg.exe 936 reg.exe 4080 reg.exe 2592 reg.exe 3688 reg.exe 1580 reg.exe 4964 Process not Found 5064 reg.exe 8 reg.exe 556 reg.exe 4416 Process not Found 4352 reg.exe 4540 Process not Found 876 Process not Found 3048 reg.exe 4540 reg.exe 4320 reg.exe 1400 reg.exe 4192 reg.exe 4500 reg.exe 8 reg.exe 2980 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 936 d5d7c65b0c09f3exeexeexeex.exe 936 d5d7c65b0c09f3exeexeexeex.exe 936 d5d7c65b0c09f3exeexeexeex.exe 936 d5d7c65b0c09f3exeexeexeex.exe 4120 d5d7c65b0c09f3exeexeexeex.exe 4120 d5d7c65b0c09f3exeexeexeex.exe 4120 d5d7c65b0c09f3exeexeexeex.exe 4120 d5d7c65b0c09f3exeexeexeex.exe 3656 d5d7c65b0c09f3exeexeexeex.exe 3656 d5d7c65b0c09f3exeexeexeex.exe 3656 d5d7c65b0c09f3exeexeexeex.exe 3656 d5d7c65b0c09f3exeexeexeex.exe 4524 d5d7c65b0c09f3exeexeexeex.exe 4524 d5d7c65b0c09f3exeexeexeex.exe 4524 d5d7c65b0c09f3exeexeexeex.exe 4524 d5d7c65b0c09f3exeexeexeex.exe 1524 d5d7c65b0c09f3exeexeexeex.exe 1524 d5d7c65b0c09f3exeexeexeex.exe 1524 d5d7c65b0c09f3exeexeexeex.exe 1524 d5d7c65b0c09f3exeexeexeex.exe 2360 reg.exe 2360 reg.exe 2360 reg.exe 2360 reg.exe 3472 Conhost.exe 3472 Conhost.exe 3472 Conhost.exe 3472 Conhost.exe 4184 d5d7c65b0c09f3exeexeexeex.exe 4184 d5d7c65b0c09f3exeexeexeex.exe 4184 d5d7c65b0c09f3exeexeexeex.exe 4184 d5d7c65b0c09f3exeexeexeex.exe 2744 d5d7c65b0c09f3exeexeexeex.exe 2744 d5d7c65b0c09f3exeexeexeex.exe 2744 d5d7c65b0c09f3exeexeexeex.exe 2744 d5d7c65b0c09f3exeexeexeex.exe 4480 Process not Found 4480 Process not Found 4480 Process not Found 4480 Process not Found 4632 d5d7c65b0c09f3exeexeexeex.exe 4632 d5d7c65b0c09f3exeexeexeex.exe 4632 d5d7c65b0c09f3exeexeexeex.exe 4632 d5d7c65b0c09f3exeexeexeex.exe 3828 d5d7c65b0c09f3exeexeexeex.exe 3828 d5d7c65b0c09f3exeexeexeex.exe 3828 d5d7c65b0c09f3exeexeexeex.exe 3828 d5d7c65b0c09f3exeexeexeex.exe 4464 d5d7c65b0c09f3exeexeexeex.exe 4464 d5d7c65b0c09f3exeexeexeex.exe 4464 d5d7c65b0c09f3exeexeexeex.exe 4464 d5d7c65b0c09f3exeexeexeex.exe 924 d5d7c65b0c09f3exeexeexeex.exe 924 d5d7c65b0c09f3exeexeexeex.exe 924 d5d7c65b0c09f3exeexeexeex.exe 924 d5d7c65b0c09f3exeexeexeex.exe 3020 d5d7c65b0c09f3exeexeexeex.exe 3020 d5d7c65b0c09f3exeexeexeex.exe 3020 d5d7c65b0c09f3exeexeexeex.exe 3020 d5d7c65b0c09f3exeexeexeex.exe 4188 cmd.exe 4188 cmd.exe 4188 cmd.exe 4188 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 464 DQcIQUQg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe 464 DQcIQUQg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 5012 936 d5d7c65b0c09f3exeexeexeex.exe 84 PID 936 wrote to memory of 5012 936 d5d7c65b0c09f3exeexeexeex.exe 84 PID 936 wrote to memory of 5012 936 d5d7c65b0c09f3exeexeexeex.exe 84 PID 936 wrote to memory of 464 936 d5d7c65b0c09f3exeexeexeex.exe 85 PID 936 wrote to memory of 464 936 d5d7c65b0c09f3exeexeexeex.exe 85 PID 936 wrote to memory of 464 936 d5d7c65b0c09f3exeexeexeex.exe 85 PID 936 wrote to memory of 4824 936 d5d7c65b0c09f3exeexeexeex.exe 86 PID 936 wrote to memory of 4824 936 d5d7c65b0c09f3exeexeexeex.exe 86 PID 936 wrote to memory of 4824 936 d5d7c65b0c09f3exeexeexeex.exe 86 PID 936 wrote to memory of 4616 936 d5d7c65b0c09f3exeexeexeex.exe 93 PID 936 wrote to memory of 4616 936 d5d7c65b0c09f3exeexeexeex.exe 93 PID 936 wrote to memory of 4616 936 d5d7c65b0c09f3exeexeexeex.exe 93 PID 936 wrote to memory of 5068 936 d5d7c65b0c09f3exeexeexeex.exe 92 PID 936 wrote to memory of 5068 936 d5d7c65b0c09f3exeexeexeex.exe 92 PID 936 wrote to memory of 5068 936 d5d7c65b0c09f3exeexeexeex.exe 92 PID 936 wrote to memory of 2044 936 d5d7c65b0c09f3exeexeexeex.exe 91 PID 936 wrote to memory of 2044 936 d5d7c65b0c09f3exeexeexeex.exe 91 PID 936 wrote to memory of 2044 936 d5d7c65b0c09f3exeexeexeex.exe 91 PID 936 wrote to memory of 832 936 d5d7c65b0c09f3exeexeexeex.exe 90 PID 936 wrote to memory of 832 936 d5d7c65b0c09f3exeexeexeex.exe 90 PID 936 wrote to memory of 832 936 d5d7c65b0c09f3exeexeexeex.exe 90 PID 4824 wrote to memory of 4120 4824 cmd.exe 97 PID 4824 wrote to memory of 4120 4824 cmd.exe 97 PID 4824 wrote to memory of 4120 4824 cmd.exe 97 PID 832 wrote to memory of 2240 832 cmd.exe 98 PID 832 wrote to memory of 2240 832 cmd.exe 98 PID 832 wrote to memory of 2240 832 cmd.exe 98 PID 4120 wrote to memory of 4780 4120 d5d7c65b0c09f3exeexeexeex.exe 99 PID 4120 wrote to memory of 4780 4120 d5d7c65b0c09f3exeexeexeex.exe 99 PID 4120 wrote to memory of 4780 4120 d5d7c65b0c09f3exeexeexeex.exe 99 PID 4780 wrote to memory of 3656 4780 cmd.exe 101 PID 4780 wrote to memory of 3656 4780 cmd.exe 101 PID 4780 wrote to memory of 3656 4780 cmd.exe 101 PID 4120 wrote to memory of 2160 4120 d5d7c65b0c09f3exeexeexeex.exe 103 PID 4120 wrote to memory of 2160 4120 d5d7c65b0c09f3exeexeexeex.exe 103 PID 4120 wrote to memory of 2160 4120 d5d7c65b0c09f3exeexeexeex.exe 103 PID 4120 wrote to memory of 4452 4120 d5d7c65b0c09f3exeexeexeex.exe 102 PID 4120 wrote to memory of 4452 4120 d5d7c65b0c09f3exeexeexeex.exe 102 PID 4120 wrote to memory of 4452 4120 d5d7c65b0c09f3exeexeexeex.exe 102 PID 4120 wrote to memory of 1828 4120 d5d7c65b0c09f3exeexeexeex.exe 109 PID 4120 wrote to memory of 1828 4120 d5d7c65b0c09f3exeexeexeex.exe 109 PID 4120 wrote to memory of 1828 4120 d5d7c65b0c09f3exeexeexeex.exe 109 PID 4120 wrote to memory of 3100 4120 d5d7c65b0c09f3exeexeexeex.exe 105 PID 4120 wrote to memory of 3100 4120 d5d7c65b0c09f3exeexeexeex.exe 105 PID 4120 wrote to memory of 3100 4120 d5d7c65b0c09f3exeexeexeex.exe 105 PID 3100 wrote to memory of 3752 3100 cmd.exe 110 PID 3100 wrote to memory of 3752 3100 cmd.exe 110 PID 3100 wrote to memory of 3752 3100 cmd.exe 110 PID 3656 wrote to memory of 2632 3656 d5d7c65b0c09f3exeexeexeex.exe 111 PID 3656 wrote to memory of 2632 3656 d5d7c65b0c09f3exeexeexeex.exe 111 PID 3656 wrote to memory of 2632 3656 d5d7c65b0c09f3exeexeexeex.exe 111 PID 2632 wrote to memory of 4524 2632 cmd.exe 113 PID 2632 wrote to memory of 4524 2632 cmd.exe 113 PID 2632 wrote to memory of 4524 2632 cmd.exe 113 PID 3656 wrote to memory of 2248 3656 d5d7c65b0c09f3exeexeexeex.exe 121 PID 3656 wrote to memory of 2248 3656 d5d7c65b0c09f3exeexeexeex.exe 121 PID 3656 wrote to memory of 2248 3656 d5d7c65b0c09f3exeexeexeex.exe 121 PID 3656 wrote to memory of 5056 3656 d5d7c65b0c09f3exeexeexeex.exe 120 PID 3656 wrote to memory of 5056 3656 d5d7c65b0c09f3exeexeexeex.exe 120 PID 3656 wrote to memory of 5056 3656 d5d7c65b0c09f3exeexeexeex.exe 120 PID 3656 wrote to memory of 4364 3656 d5d7c65b0c09f3exeexeexeex.exe 119 PID 3656 wrote to memory of 4364 3656 d5d7c65b0c09f3exeexeexeex.exe 119 PID 3656 wrote to memory of 4364 3656 d5d7c65b0c09f3exeexeexeex.exe 119 PID 3656 wrote to memory of 3788 3656 d5d7c65b0c09f3exeexeexeex.exe 114 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5d7c65b0c09f3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d5d7c65b0c09f3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d5d7c65b0c09f3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\pYgEsYsU\UGcsYQMY.exe"C:\Users\Admin\pYgEsYsU\UGcsYQMY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5012
-
-
C:\ProgramData\GgEYgogM\DQcIQUQg.exe"C:\ProgramData\GgEYgogM\DQcIQUQg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"8⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"10⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex11⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"12⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex13⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"14⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"16⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"18⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex19⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"20⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"22⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"24⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"26⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"28⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"30⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex31⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"32⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex33⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"34⤵PID:3252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex35⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"36⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex37⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"38⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex39⤵PID:2052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"40⤵PID:1724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex41⤵
- Checks whether UAC is enabled
- System policy modification
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"42⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex43⤵
- Modifies visibility of file extensions in Explorer
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"44⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex45⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"46⤵PID:4208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex47⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"48⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex49⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"50⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex51⤵PID:2704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"52⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex53⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"54⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex55⤵PID:668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"56⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex57⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"58⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex59⤵PID:824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"60⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex61⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"62⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex63⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"64⤵PID:2152
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex65⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"66⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex67⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"68⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex69⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"70⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex71⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"72⤵PID:4968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex73⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"74⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex75⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"76⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex77⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"78⤵
- Modifies visibility of file extensions in Explorer
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex79⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"80⤵PID:3140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV182⤵PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex81⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"82⤵PID:4980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex83⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"84⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex85⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"86⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex87⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"88⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex89⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"90⤵PID:4592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex91⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"92⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex93⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"94⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex95⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"96⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex97⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"98⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex99⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"100⤵PID:4984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex101⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"102⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex103⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"104⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex105⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"106⤵PID:4944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex107⤵PID:828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"108⤵
- Checks whether UAC is enabled
- System policy modification
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex109⤵PID:3576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"110⤵PID:2916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex111⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"112⤵
- Checks whether UAC is enabled
- System policy modification
PID:4356 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex113⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"114⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex115⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"116⤵PID:3624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex117⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"118⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex119⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"120⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex121⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d5d7c65b0c09f3exeexeexeex"122⤵PID:2600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-