Analysis
-
max time kernel
40s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2023, 12:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6dc8bf19b8a78e_JC.exe
Resource
win7-20230712-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
6dc8bf19b8a78e_JC.exe
Resource
win10v2004-20230703-en
9 signatures
150 seconds
General
-
Target
6dc8bf19b8a78e_JC.exe
-
Size
217KB
-
MD5
6dc8bf19b8a78e62d212bf1d7139f0c8
-
SHA1
b1fd75b053f4b53bb7b5ea4cfad1790841e89c7d
-
SHA256
7bf3cda84dd48eb57d2f43c18d55c2ff80e96c559c977796be1a1a96eb555835
-
SHA512
11f947fa99f2e47fa5797db0bc2b8c0a7ff2162f43e03dea66874520f69a89f0e11409ae4f6361f16b5cf0a0f06088b26790f0253f42f745036c400331998d2f
-
SSDEEP
6144:T57HkdSE6gq6RkqcTVAnYkBNJcx0mwLN5eWxE6qbLP:B5E6NqcifncOpyIuL
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 44 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mousocoreworker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6dc8bf19b8a78e_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2752 sEwAgoAA.exe 400 CgYkUUYo.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sEwAgoAA.exe = "C:\\Users\\Admin\\JcEIsUgw\\sEwAgoAA.exe" 6dc8bf19b8a78e_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CgYkUUYo.exe = "C:\\ProgramData\\dcMUkgQY\\CgYkUUYo.exe" 6dc8bf19b8a78e_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sEwAgoAA.exe = "C:\\Users\\Admin\\JcEIsUgw\\sEwAgoAA.exe" sEwAgoAA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CgYkUUYo.exe = "C:\\ProgramData\\dcMUkgQY\\CgYkUUYo.exe" CgYkUUYo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6dc8bf19b8a78e_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6dc8bf19b8a78e_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2196 reg.exe 4452 reg.exe 2736 reg.exe 1376 reg.exe 1784 reg.exe 4360 reg.exe 3900 reg.exe 3104 reg.exe 2184 reg.exe 3576 reg.exe 1780 reg.exe 4216 reg.exe 4300 reg.exe 388 reg.exe 2468 reg.exe 2700 reg.exe 2468 reg.exe 4072 reg.exe 4380 reg.exe 1892 reg.exe 2220 reg.exe 640 reg.exe 3576 reg.exe 1328 reg.exe 2544 reg.exe 3344 reg.exe 4292 reg.exe 1480 reg.exe 2720 reg.exe 5060 reg.exe 1052 reg.exe 2340 reg.exe 3736 reg.exe 2872 reg.exe 492 reg.exe 3224 reg.exe 4336 reg.exe 2556 reg.exe 3352 reg.exe 3488 reg.exe 4668 reg.exe 2932 reg.exe 3340 reg.exe 3268 reg.exe 4508 reg.exe 3800 reg.exe 2816 reg.exe 880 reg.exe 4480 reg.exe 1672 reg.exe 4992 reg.exe 1744 reg.exe 1820 reg.exe 2244 reg.exe 4396 reg.exe 1948 reg.exe 4260 reg.exe 5008 reg.exe 4800 reg.exe 4316 reg.exe 408 reg.exe 1612 reg.exe 2860 reg.exe 4336 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 6dc8bf19b8a78e_JC.exe 2064 6dc8bf19b8a78e_JC.exe 2064 6dc8bf19b8a78e_JC.exe 2064 6dc8bf19b8a78e_JC.exe 1888 6dc8bf19b8a78e_JC.exe 1888 6dc8bf19b8a78e_JC.exe 1888 6dc8bf19b8a78e_JC.exe 1888 6dc8bf19b8a78e_JC.exe 3880 6dc8bf19b8a78e_JC.exe 3880 6dc8bf19b8a78e_JC.exe 3880 6dc8bf19b8a78e_JC.exe 3880 6dc8bf19b8a78e_JC.exe 1704 6dc8bf19b8a78e_JC.exe 1704 6dc8bf19b8a78e_JC.exe 1704 6dc8bf19b8a78e_JC.exe 1704 6dc8bf19b8a78e_JC.exe 848 6dc8bf19b8a78e_JC.exe 848 6dc8bf19b8a78e_JC.exe 848 6dc8bf19b8a78e_JC.exe 848 6dc8bf19b8a78e_JC.exe 4712 6dc8bf19b8a78e_JC.exe 4712 6dc8bf19b8a78e_JC.exe 4712 6dc8bf19b8a78e_JC.exe 4712 6dc8bf19b8a78e_JC.exe 2764 6dc8bf19b8a78e_JC.exe 2764 6dc8bf19b8a78e_JC.exe 2764 6dc8bf19b8a78e_JC.exe 2764 6dc8bf19b8a78e_JC.exe 1428 6dc8bf19b8a78e_JC.exe 1428 6dc8bf19b8a78e_JC.exe 1428 6dc8bf19b8a78e_JC.exe 1428 6dc8bf19b8a78e_JC.exe 3776 6dc8bf19b8a78e_JC.exe 3776 6dc8bf19b8a78e_JC.exe 3776 6dc8bf19b8a78e_JC.exe 3776 6dc8bf19b8a78e_JC.exe 1632 6dc8bf19b8a78e_JC.exe 1632 6dc8bf19b8a78e_JC.exe 1632 6dc8bf19b8a78e_JC.exe 1632 6dc8bf19b8a78e_JC.exe 2944 6dc8bf19b8a78e_JC.exe 2944 6dc8bf19b8a78e_JC.exe 2944 6dc8bf19b8a78e_JC.exe 2944 6dc8bf19b8a78e_JC.exe 5088 Conhost.exe 5088 Conhost.exe 5088 Conhost.exe 5088 Conhost.exe 4684 Conhost.exe 4684 Conhost.exe 4684 Conhost.exe 4684 Conhost.exe 4448 6dc8bf19b8a78e_JC.exe 4448 6dc8bf19b8a78e_JC.exe 4448 6dc8bf19b8a78e_JC.exe 4448 6dc8bf19b8a78e_JC.exe 1124 Conhost.exe 1124 Conhost.exe 1124 Conhost.exe 1124 Conhost.exe 2004 reg.exe 2004 reg.exe 2004 reg.exe 2004 reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2752 2064 6dc8bf19b8a78e_JC.exe 85 PID 2064 wrote to memory of 2752 2064 6dc8bf19b8a78e_JC.exe 85 PID 2064 wrote to memory of 2752 2064 6dc8bf19b8a78e_JC.exe 85 PID 2064 wrote to memory of 400 2064 6dc8bf19b8a78e_JC.exe 86 PID 2064 wrote to memory of 400 2064 6dc8bf19b8a78e_JC.exe 86 PID 2064 wrote to memory of 400 2064 6dc8bf19b8a78e_JC.exe 86 PID 2064 wrote to memory of 3564 2064 6dc8bf19b8a78e_JC.exe 87 PID 2064 wrote to memory of 3564 2064 6dc8bf19b8a78e_JC.exe 87 PID 2064 wrote to memory of 3564 2064 6dc8bf19b8a78e_JC.exe 87 PID 2064 wrote to memory of 1744 2064 6dc8bf19b8a78e_JC.exe 89 PID 2064 wrote to memory of 1744 2064 6dc8bf19b8a78e_JC.exe 89 PID 2064 wrote to memory of 1744 2064 6dc8bf19b8a78e_JC.exe 89 PID 2064 wrote to memory of 2556 2064 6dc8bf19b8a78e_JC.exe 90 PID 2064 wrote to memory of 2556 2064 6dc8bf19b8a78e_JC.exe 90 PID 2064 wrote to memory of 2556 2064 6dc8bf19b8a78e_JC.exe 90 PID 2064 wrote to memory of 4216 2064 6dc8bf19b8a78e_JC.exe 91 PID 2064 wrote to memory of 4216 2064 6dc8bf19b8a78e_JC.exe 91 PID 2064 wrote to memory of 4216 2064 6dc8bf19b8a78e_JC.exe 91 PID 2064 wrote to memory of 1504 2064 6dc8bf19b8a78e_JC.exe 92 PID 2064 wrote to memory of 1504 2064 6dc8bf19b8a78e_JC.exe 92 PID 2064 wrote to memory of 1504 2064 6dc8bf19b8a78e_JC.exe 92 PID 3564 wrote to memory of 1888 3564 cmd.exe 97 PID 3564 wrote to memory of 1888 3564 cmd.exe 97 PID 3564 wrote to memory of 1888 3564 cmd.exe 97 PID 1504 wrote to memory of 2712 1504 cmd.exe 98 PID 1504 wrote to memory of 2712 1504 cmd.exe 98 PID 1504 wrote to memory of 2712 1504 cmd.exe 98 PID 1888 wrote to memory of 232 1888 6dc8bf19b8a78e_JC.exe 99 PID 1888 wrote to memory of 232 1888 6dc8bf19b8a78e_JC.exe 99 PID 1888 wrote to memory of 232 1888 6dc8bf19b8a78e_JC.exe 99 PID 1888 wrote to memory of 4292 1888 6dc8bf19b8a78e_JC.exe 101 PID 1888 wrote to memory of 4292 1888 6dc8bf19b8a78e_JC.exe 101 PID 1888 wrote to memory of 4292 1888 6dc8bf19b8a78e_JC.exe 101 PID 1888 wrote to memory of 3268 1888 6dc8bf19b8a78e_JC.exe 102 PID 1888 wrote to memory of 3268 1888 6dc8bf19b8a78e_JC.exe 102 PID 1888 wrote to memory of 3268 1888 6dc8bf19b8a78e_JC.exe 102 PID 1888 wrote to memory of 4976 1888 6dc8bf19b8a78e_JC.exe 105 PID 1888 wrote to memory of 4976 1888 6dc8bf19b8a78e_JC.exe 105 PID 1888 wrote to memory of 4976 1888 6dc8bf19b8a78e_JC.exe 105 PID 1888 wrote to memory of 1272 1888 6dc8bf19b8a78e_JC.exe 103 PID 1888 wrote to memory of 1272 1888 6dc8bf19b8a78e_JC.exe 103 PID 1888 wrote to memory of 1272 1888 6dc8bf19b8a78e_JC.exe 103 PID 1272 wrote to memory of 4648 1272 cmd.exe 109 PID 1272 wrote to memory of 4648 1272 cmd.exe 109 PID 1272 wrote to memory of 4648 1272 cmd.exe 109 PID 232 wrote to memory of 3880 232 cmd.exe 110 PID 232 wrote to memory of 3880 232 cmd.exe 110 PID 232 wrote to memory of 3880 232 cmd.exe 110 PID 3880 wrote to memory of 4548 3880 6dc8bf19b8a78e_JC.exe 111 PID 3880 wrote to memory of 4548 3880 6dc8bf19b8a78e_JC.exe 111 PID 3880 wrote to memory of 4548 3880 6dc8bf19b8a78e_JC.exe 111 PID 3880 wrote to memory of 4028 3880 6dc8bf19b8a78e_JC.exe 113 PID 3880 wrote to memory of 4028 3880 6dc8bf19b8a78e_JC.exe 113 PID 3880 wrote to memory of 4028 3880 6dc8bf19b8a78e_JC.exe 113 PID 3880 wrote to memory of 3344 3880 6dc8bf19b8a78e_JC.exe 114 PID 3880 wrote to memory of 3344 3880 6dc8bf19b8a78e_JC.exe 114 PID 3880 wrote to memory of 3344 3880 6dc8bf19b8a78e_JC.exe 114 PID 3880 wrote to memory of 4512 3880 6dc8bf19b8a78e_JC.exe 115 PID 3880 wrote to memory of 4512 3880 6dc8bf19b8a78e_JC.exe 115 PID 3880 wrote to memory of 4512 3880 6dc8bf19b8a78e_JC.exe 115 PID 3880 wrote to memory of 4032 3880 6dc8bf19b8a78e_JC.exe 116 PID 3880 wrote to memory of 4032 3880 6dc8bf19b8a78e_JC.exe 116 PID 3880 wrote to memory of 4032 3880 6dc8bf19b8a78e_JC.exe 116 PID 4548 wrote to memory of 1704 4548 cmd.exe 121 -
System policy modification 1 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6dc8bf19b8a78e_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6dc8bf19b8a78e_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exe"C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\JcEIsUgw\sEwAgoAA.exe"C:\Users\Admin\JcEIsUgw\sEwAgoAA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2752
-
-
C:\ProgramData\dcMUkgQY\CgYkUUYo.exe"C:\ProgramData\dcMUkgQY\CgYkUUYo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"8⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"10⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"12⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"14⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"16⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"18⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"20⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"22⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC23⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"24⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC25⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"26⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"28⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC29⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"30⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC31⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"32⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC33⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"34⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC35⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"36⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC37⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"38⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC39⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"40⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC41⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"42⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC43⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"44⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC45⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"46⤵PID:3112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC47⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"48⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC49⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"50⤵PID:4480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵
- Modifies visibility of file extensions in Explorer
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC51⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"52⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC53⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"54⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC55⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"56⤵PID:4264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC57⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"58⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC59⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"60⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC61⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"62⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC63⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"64⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC65⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"66⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC67⤵PID:2536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"68⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC69⤵PID:3908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"70⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC71⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"72⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC73⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"74⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC75⤵PID:2764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"76⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC77⤵PID:1412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"78⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC79⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"80⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC81⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"82⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC83⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"84⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC85⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"86⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC87⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"88⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC89⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"90⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC91⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"92⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC93⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"94⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC95⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"96⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC97⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"98⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC99⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"100⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC101⤵PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"102⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC103⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"104⤵PID:2888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC105⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"106⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC107⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"108⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC109⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC111⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"112⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC113⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"114⤵PID:4920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC115⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"116⤵PID:2656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC117⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"118⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC119⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"120⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC.exeC:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC121⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dc8bf19b8a78e_JC"122⤵PID:3820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-