Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_1e6e53ed590499exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_1e6e53ed590499exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_1e6e53ed590499exeexe_JC.exe
-
Size
259KB
-
MD5
1e6e53ed590499525f4e9a9aef9ad89c
-
SHA1
cb13ba0144b30486b3582d22bff8c90a4f9e2bbb
-
SHA256
61fe5a5ae9f75bcbed369a70c0d89a6af71b4907d4ff68b481e230ac66f2a98a
-
SHA512
d893857f331711a8e5f1755bafd7c5d40eeaf2ef3bcbc14cfb3d08f66669ab0f2da3c4778fcc77590823ff66181590dbc18dfec0dfeeb9a765cea41c6e600199
-
SSDEEP
6144:gJ8Fkehcn7WXlMM6oStKQa5e8PxleHo00N+rDZPLii+p:gGxJXbzSba5tYo00N+rDZzIp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_1e6e53ed590499exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_1e6e53ed590499exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation rsYckgUM.exe -
Executes dropped EXE 4 IoCs
pid Process 4128 rsYckgUM.exe 1724 COkskook.exe 2800 rsYckgUM.exe 748 rsYckgUM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rsYckgUM.exe = "C:\\Users\\Admin\\bGsskEUs\\rsYckgUM.exe" rsYckgUM.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rsYckgUM.exe = "C:\\Users\\Admin\\bGsskEUs\\rsYckgUM.exe" rsYckgUM.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rsYckgUM.exe = "C:\\Users\\Admin\\bGsskEUs\\rsYckgUM.exe" NA_NA_1e6e53ed590499exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\COkskook.exe = "C:\\ProgramData\\EcUskIAM\\COkskook.exe" NA_NA_1e6e53ed590499exeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rsYckgUM.exe = "C:\\Users\\Admin\\bGsskEUs\\rsYckgUM.exe" rsYckgUM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\COkskook.exe = "C:\\ProgramData\\EcUskIAM\\COkskook.exe" COkskook.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rsYckgUM.exe = "C:\\Users\\Admin\\bGsskEUs\\rsYckgUM.exe" cscript.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe rsYckgUM.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe rsYckgUM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2380 taskkill.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 5036 Process not Found 1948 Process not Found 3732 reg.exe 1948 reg.exe 408 reg.exe 4436 reg.exe 1260 reg.exe 4136 reg.exe 896 Process not Found 928 reg.exe 1220 reg.exe 2744 reg.exe 1728 reg.exe 3356 reg.exe 1984 reg.exe 4264 reg.exe 508 reg.exe 3388 reg.exe 2384 Process not Found 2668 Process not Found 2668 reg.exe 3060 reg.exe 5036 reg.exe 4640 Process not Found 3200 Process not Found 4136 reg.exe 1312 reg.exe 2480 reg.exe 3048 Process not Found 1420 Process not Found 960 reg.exe 5092 reg.exe 5092 reg.exe 1344 reg.exe 3044 reg.exe 3552 Process not Found 1276 Process not Found 2164 reg.exe 4660 reg.exe 1628 reg.exe 3388 Process not Found 3740 Process not Found 4492 reg.exe 1808 reg.exe 4416 Process not Found 3980 reg.exe 1492 reg.exe 1804 reg.exe 4268 reg.exe 3356 reg.exe 3016 reg.exe 748 reg.exe 1728 reg.exe 3016 reg.exe 2132 reg.exe 1764 reg.exe 3512 Process not Found 3776 reg.exe 1676 Process not Found 1808 Process not Found 856 reg.exe 4176 reg.exe 1804 reg.exe 3388 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 1356 NA_NA_1e6e53ed590499exeexe_JC.exe 1356 NA_NA_1e6e53ed590499exeexe_JC.exe 1356 NA_NA_1e6e53ed590499exeexe_JC.exe 1356 NA_NA_1e6e53ed590499exeexe_JC.exe 3360 NA_NA_1e6e53ed590499exeexe_JC.exe 3360 NA_NA_1e6e53ed590499exeexe_JC.exe 3360 NA_NA_1e6e53ed590499exeexe_JC.exe 3360 NA_NA_1e6e53ed590499exeexe_JC.exe 4748 NA_NA_1e6e53ed590499exeexe_JC.exe 4748 NA_NA_1e6e53ed590499exeexe_JC.exe 4748 NA_NA_1e6e53ed590499exeexe_JC.exe 4748 NA_NA_1e6e53ed590499exeexe_JC.exe 4580 Conhost.exe 4580 Conhost.exe 4580 Conhost.exe 4580 Conhost.exe 1580 Conhost.exe 1580 Conhost.exe 1580 Conhost.exe 1580 Conhost.exe 4468 cmd.exe 4468 cmd.exe 4468 cmd.exe 4468 cmd.exe 1892 NA_NA_1e6e53ed590499exeexe_JC.exe 1892 NA_NA_1e6e53ed590499exeexe_JC.exe 1892 NA_NA_1e6e53ed590499exeexe_JC.exe 1892 NA_NA_1e6e53ed590499exeexe_JC.exe 4108 NA_NA_1e6e53ed590499exeexe_JC.exe 4108 NA_NA_1e6e53ed590499exeexe_JC.exe 4108 NA_NA_1e6e53ed590499exeexe_JC.exe 4108 NA_NA_1e6e53ed590499exeexe_JC.exe 4640 Conhost.exe 4640 Conhost.exe 4640 Conhost.exe 4640 Conhost.exe 2384 reg.exe 2384 reg.exe 2384 reg.exe 2384 reg.exe 1312 cmd.exe 1312 cmd.exe 1312 cmd.exe 1312 cmd.exe 4536 NA_NA_1e6e53ed590499exeexe_JC.exe 4536 NA_NA_1e6e53ed590499exeexe_JC.exe 4536 NA_NA_1e6e53ed590499exeexe_JC.exe 4536 NA_NA_1e6e53ed590499exeexe_JC.exe 3424 Conhost.exe 3424 Conhost.exe 3424 Conhost.exe 3424 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 rsYckgUM.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 Conhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe 2800 rsYckgUM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4128 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 88 PID 2960 wrote to memory of 4128 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 88 PID 2960 wrote to memory of 4128 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 88 PID 2960 wrote to memory of 1724 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 89 PID 2960 wrote to memory of 1724 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 89 PID 2960 wrote to memory of 1724 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 89 PID 2960 wrote to memory of 4252 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 90 PID 2960 wrote to memory of 4252 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 90 PID 2960 wrote to memory of 4252 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 90 PID 2960 wrote to memory of 2060 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 98 PID 2960 wrote to memory of 2060 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 98 PID 2960 wrote to memory of 2060 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 98 PID 2960 wrote to memory of 4364 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 97 PID 2960 wrote to memory of 4364 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 97 PID 2960 wrote to memory of 4364 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 97 PID 2960 wrote to memory of 1672 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 96 PID 2960 wrote to memory of 1672 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 96 PID 2960 wrote to memory of 1672 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 96 PID 2960 wrote to memory of 3204 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 92 PID 2960 wrote to memory of 3204 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 92 PID 2960 wrote to memory of 3204 2960 NA_NA_1e6e53ed590499exeexe_JC.exe 92 PID 4252 wrote to memory of 2924 4252 cmd.exe 100 PID 4252 wrote to memory of 2924 4252 cmd.exe 100 PID 4252 wrote to memory of 2924 4252 cmd.exe 100 PID 3204 wrote to memory of 4276 3204 cmd.exe 101 PID 3204 wrote to memory of 4276 3204 cmd.exe 101 PID 3204 wrote to memory of 4276 3204 cmd.exe 101 PID 2924 wrote to memory of 1592 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 102 PID 2924 wrote to memory of 1592 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 102 PID 2924 wrote to memory of 1592 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 102 PID 2924 wrote to memory of 116 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 104 PID 2924 wrote to memory of 116 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 104 PID 2924 wrote to memory of 116 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 104 PID 2924 wrote to memory of 4864 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 109 PID 2924 wrote to memory of 4864 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 109 PID 2924 wrote to memory of 4864 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 109 PID 2924 wrote to memory of 3732 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 108 PID 2924 wrote to memory of 3732 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 108 PID 2924 wrote to memory of 3732 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 108 PID 1592 wrote to memory of 2368 1592 cmd.exe 107 PID 1592 wrote to memory of 2368 1592 cmd.exe 107 PID 1592 wrote to memory of 2368 1592 cmd.exe 107 PID 2924 wrote to memory of 4092 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 105 PID 2924 wrote to memory of 4092 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 105 PID 2924 wrote to memory of 4092 2924 NA_NA_1e6e53ed590499exeexe_JC.exe 105 PID 4092 wrote to memory of 1276 4092 cmd.exe 113 PID 4092 wrote to memory of 1276 4092 cmd.exe 113 PID 4092 wrote to memory of 1276 4092 cmd.exe 113 PID 2368 wrote to memory of 2084 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 114 PID 2368 wrote to memory of 2084 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 114 PID 2368 wrote to memory of 2084 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 114 PID 2368 wrote to memory of 3116 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 119 PID 2368 wrote to memory of 3116 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 119 PID 2368 wrote to memory of 3116 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 119 PID 2368 wrote to memory of 3700 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 118 PID 2368 wrote to memory of 3700 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 118 PID 2368 wrote to memory of 3700 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 118 PID 2368 wrote to memory of 3980 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 117 PID 2368 wrote to memory of 3980 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 117 PID 2368 wrote to memory of 3980 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 117 PID 2368 wrote to memory of 3604 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 116 PID 2368 wrote to memory of 3604 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 116 PID 2368 wrote to memory of 3604 2368 NA_NA_1e6e53ed590499exeexe_JC.exe 116 PID 2084 wrote to memory of 1356 2084 cmd.exe 124 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\bGsskEUs\rsYckgUM.exe"C:\Users\Admin\bGsskEUs\rsYckgUM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4128
-
-
C:\ProgramData\EcUskIAM\COkskook.exe"C:\ProgramData\EcUskIAM\COkskook.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "USERNAME eq Admin" /F /IM rsYckgUM.exe3⤵
- Kills process with taskkill
PID:2380
-
-
C:\Users\Admin\bGsskEUs\rsYckgUM.exe"C:\Users\Admin\bGsskEUs\rsYckgUM.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"8⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"10⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"12⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC13⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"14⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC15⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"16⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC17⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"18⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"20⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"22⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC23⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"24⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC25⤵PID:2384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"26⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC27⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"28⤵PID:3324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"30⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC31⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"32⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC33⤵PID:564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"34⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC35⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"36⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC37⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"38⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC39⤵PID:3700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"40⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC41⤵PID:652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"42⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC43⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"44⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC45⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"46⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC47⤵PID:1804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"48⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC49⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"50⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC51⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"52⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC53⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"54⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC55⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"56⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC57⤵PID:1412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"58⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC59⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"60⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC61⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"62⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC63⤵PID:1764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"64⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC65⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"66⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC67⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"68⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC69⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"70⤵PID:3612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC71⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"72⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC73⤵PID:804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"74⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC75⤵PID:496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"76⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC77⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"78⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC79⤵PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"80⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC81⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"82⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC83⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"84⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC85⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"86⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC87⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"88⤵PID:60
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC89⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"90⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC91⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"92⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC93⤵PID:4632
-
C:\Users\Admin\bGsskEUs\rsYckgUM.exe"C:\Users\Admin\bGsskEUs\rsYckgUM.exe"94⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"94⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC95⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"96⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC97⤵PID:496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"98⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC99⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"100⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC101⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"102⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC103⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"104⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC105⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"106⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC107⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"108⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC109⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"110⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC111⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"112⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC113⤵PID:412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"114⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC115⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"116⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC117⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"118⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC119⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"120⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC121⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_1e6e53ed590499exeexe_JC"122⤵PID:1220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-