Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_22418b85a99399exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_22418b85a99399exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_22418b85a99399exeexe_JC.exe
-
Size
191KB
-
MD5
22418b85a9939990645a0ea701d9b319
-
SHA1
527372b5807339796d12562fcf3f0bd416d502d7
-
SHA256
ee1ca0a8fe7234bb019b18bc61df207d8615cdba79437ca9983a2c8cb4279432
-
SHA512
a297dee836682489a80ba51fe261901a18990c78883b33a799f2e280244db9bef8619d8715abfd3caa8143d9d68848d797cb2db71515e0d0414ee9686746f572
-
SSDEEP
3072:s3ZF1JAGQaAquTM4OWcg64vZb86j+IwZd2Q911QwsSEoB0ipkOV3:iFJAnaEtOWcqqIPdwo1zOB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Blocklisted process makes network request 1 IoCs
flow pid Process 61 3888 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation YicsMsoA.exe -
Executes dropped EXE 4 IoCs
pid Process 2196 YicsMsoA.exe 3888 rcUoUwkI.exe 1288 rcUoUwkI.exe 4224 rcUoUwkI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rcUoUwkI.exe = "C:\\ProgramData\\jSUwUkAI\\rcUoUwkI.exe" NA_NA_22418b85a99399exeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YicsMsoA.exe = "C:\\Users\\Admin\\ViUkUcIs\\YicsMsoA.exe" YicsMsoA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rcUoUwkI.exe = "C:\\ProgramData\\jSUwUkAI\\rcUoUwkI.exe" rcUoUwkI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rcUoUwkI.exe = "C:\\ProgramData\\jSUwUkAI\\rcUoUwkI.exe" rcUoUwkI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rcUoUwkI.exe = "C:\\ProgramData\\jSUwUkAI\\rcUoUwkI.exe" NA_NA_22418b85a99399exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rcUoUwkI.exe = "C:\\ProgramData\\jSUwUkAI\\rcUoUwkI.exe" rcUoUwkI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YicsMsoA.exe = "C:\\Users\\Admin\\ViUkUcIs\\YicsMsoA.exe" NA_NA_22418b85a99399exeexe_JC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe rcUoUwkI.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{110F5429-29C0-4468-9664-29E9706E8BB9}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File created C:\Windows\SysWOW64\shell32.dll.exe YicsMsoA.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe YicsMsoA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Kills process with taskkill 1 IoCs
pid Process 3712 taskkill.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1488 reg.exe 1572 reg.exe 4684 Process not Found 2832 reg.exe 4716 reg.exe 3692 reg.exe 3964 reg.exe 2348 reg.exe 4660 reg.exe 1488 reg.exe 3268 reg.exe 1680 reg.exe 404 reg.exe 1764 reg.exe 4252 reg.exe 5060 Process not Found 212 reg.exe 4636 reg.exe 2328 reg.exe 404 reg.exe 4932 reg.exe 3952 reg.exe 4776 reg.exe 3444 reg.exe 1760 reg.exe 1996 reg.exe 212 reg.exe 4116 reg.exe 3956 reg.exe 624 reg.exe 3900 reg.exe 4628 Process not Found 4160 reg.exe 2364 reg.exe 1248 reg.exe 2348 reg.exe 1084 reg.exe 5084 Process not Found 3652 reg.exe 4028 reg.exe 1660 reg.exe 4884 reg.exe 2124 Process not Found 2364 reg.exe 3876 reg.exe 1116 reg.exe 2164 reg.exe 2348 reg.exe 404 reg.exe 4884 Process not Found 3568 reg.exe 2464 Process not Found 116 reg.exe 3080 reg.exe 2308 reg.exe 4260 reg.exe 2240 reg.exe 2760 reg.exe 3440 reg.exe 4236 reg.exe 2244 reg.exe 4172 reg.exe 2648 Process not Found 3256 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 4696 NA_NA_22418b85a99399exeexe_JC.exe 4696 NA_NA_22418b85a99399exeexe_JC.exe 4696 NA_NA_22418b85a99399exeexe_JC.exe 4696 NA_NA_22418b85a99399exeexe_JC.exe 3060 NA_NA_22418b85a99399exeexe_JC.exe 3060 NA_NA_22418b85a99399exeexe_JC.exe 3060 NA_NA_22418b85a99399exeexe_JC.exe 3060 NA_NA_22418b85a99399exeexe_JC.exe 4352 NA_NA_22418b85a99399exeexe_JC.exe 4352 NA_NA_22418b85a99399exeexe_JC.exe 4352 NA_NA_22418b85a99399exeexe_JC.exe 4352 NA_NA_22418b85a99399exeexe_JC.exe 1304 NA_NA_22418b85a99399exeexe_JC.exe 1304 NA_NA_22418b85a99399exeexe_JC.exe 1304 NA_NA_22418b85a99399exeexe_JC.exe 1304 NA_NA_22418b85a99399exeexe_JC.exe 5104 NA_NA_22418b85a99399exeexe_JC.exe 5104 NA_NA_22418b85a99399exeexe_JC.exe 5104 NA_NA_22418b85a99399exeexe_JC.exe 5104 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 640 NA_NA_22418b85a99399exeexe_JC.exe 3612 NA_NA_22418b85a99399exeexe_JC.exe 3612 NA_NA_22418b85a99399exeexe_JC.exe 3612 NA_NA_22418b85a99399exeexe_JC.exe 3612 NA_NA_22418b85a99399exeexe_JC.exe 4268 Process not Found 4268 Process not Found 4268 Process not Found 4268 Process not Found 4560 NA_NA_22418b85a99399exeexe_JC.exe 4560 NA_NA_22418b85a99399exeexe_JC.exe 4560 NA_NA_22418b85a99399exeexe_JC.exe 4560 NA_NA_22418b85a99399exeexe_JC.exe 2872 NA_NA_22418b85a99399exeexe_JC.exe 2872 NA_NA_22418b85a99399exeexe_JC.exe 2872 NA_NA_22418b85a99399exeexe_JC.exe 2872 NA_NA_22418b85a99399exeexe_JC.exe 2564 cmd.exe 2564 cmd.exe 2564 cmd.exe 2564 cmd.exe 908 Process not Found 908 Process not Found 908 Process not Found 908 Process not Found 1260 reg.exe 1260 reg.exe 1260 reg.exe 1260 reg.exe 4260 NA_NA_22418b85a99399exeexe_JC.exe 4260 NA_NA_22418b85a99399exeexe_JC.exe 4260 NA_NA_22418b85a99399exeexe_JC.exe 4260 NA_NA_22418b85a99399exeexe_JC.exe 2392 NA_NA_22418b85a99399exeexe_JC.exe 2392 NA_NA_22418b85a99399exeexe_JC.exe 2392 NA_NA_22418b85a99399exeexe_JC.exe 2392 NA_NA_22418b85a99399exeexe_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 YicsMsoA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3712 cmd.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe 2196 YicsMsoA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 2196 640 NA_NA_22418b85a99399exeexe_JC.exe 81 PID 640 wrote to memory of 2196 640 NA_NA_22418b85a99399exeexe_JC.exe 81 PID 640 wrote to memory of 2196 640 NA_NA_22418b85a99399exeexe_JC.exe 81 PID 640 wrote to memory of 3888 640 NA_NA_22418b85a99399exeexe_JC.exe 82 PID 640 wrote to memory of 3888 640 NA_NA_22418b85a99399exeexe_JC.exe 82 PID 640 wrote to memory of 3888 640 NA_NA_22418b85a99399exeexe_JC.exe 82 PID 640 wrote to memory of 4240 640 NA_NA_22418b85a99399exeexe_JC.exe 83 PID 640 wrote to memory of 4240 640 NA_NA_22418b85a99399exeexe_JC.exe 83 PID 640 wrote to memory of 4240 640 NA_NA_22418b85a99399exeexe_JC.exe 83 PID 640 wrote to memory of 2160 640 NA_NA_22418b85a99399exeexe_JC.exe 85 PID 640 wrote to memory of 2160 640 NA_NA_22418b85a99399exeexe_JC.exe 85 PID 640 wrote to memory of 2160 640 NA_NA_22418b85a99399exeexe_JC.exe 85 PID 640 wrote to memory of 3952 640 NA_NA_22418b85a99399exeexe_JC.exe 86 PID 640 wrote to memory of 3952 640 NA_NA_22418b85a99399exeexe_JC.exe 86 PID 640 wrote to memory of 3952 640 NA_NA_22418b85a99399exeexe_JC.exe 86 PID 640 wrote to memory of 116 640 NA_NA_22418b85a99399exeexe_JC.exe 88 PID 640 wrote to memory of 116 640 NA_NA_22418b85a99399exeexe_JC.exe 88 PID 640 wrote to memory of 116 640 NA_NA_22418b85a99399exeexe_JC.exe 88 PID 640 wrote to memory of 4532 640 NA_NA_22418b85a99399exeexe_JC.exe 87 PID 640 wrote to memory of 4532 640 NA_NA_22418b85a99399exeexe_JC.exe 87 PID 640 wrote to memory of 4532 640 NA_NA_22418b85a99399exeexe_JC.exe 87 PID 4240 wrote to memory of 4696 4240 cmd.exe 93 PID 4240 wrote to memory of 4696 4240 cmd.exe 93 PID 4240 wrote to memory of 4696 4240 cmd.exe 93 PID 4696 wrote to memory of 1896 4696 NA_NA_22418b85a99399exeexe_JC.exe 94 PID 4696 wrote to memory of 1896 4696 NA_NA_22418b85a99399exeexe_JC.exe 94 PID 4696 wrote to memory of 1896 4696 NA_NA_22418b85a99399exeexe_JC.exe 94 PID 4696 wrote to memory of 4564 4696 NA_NA_22418b85a99399exeexe_JC.exe 95 PID 4696 wrote to memory of 4564 4696 NA_NA_22418b85a99399exeexe_JC.exe 95 PID 4696 wrote to memory of 4564 4696 NA_NA_22418b85a99399exeexe_JC.exe 95 PID 4696 wrote to memory of 4656 4696 NA_NA_22418b85a99399exeexe_JC.exe 96 PID 4696 wrote to memory of 4656 4696 NA_NA_22418b85a99399exeexe_JC.exe 96 PID 4696 wrote to memory of 4656 4696 NA_NA_22418b85a99399exeexe_JC.exe 96 PID 4696 wrote to memory of 4128 4696 NA_NA_22418b85a99399exeexe_JC.exe 97 PID 4696 wrote to memory of 4128 4696 NA_NA_22418b85a99399exeexe_JC.exe 97 PID 4696 wrote to memory of 4128 4696 NA_NA_22418b85a99399exeexe_JC.exe 97 PID 4696 wrote to memory of 1388 4696 NA_NA_22418b85a99399exeexe_JC.exe 98 PID 4696 wrote to memory of 1388 4696 NA_NA_22418b85a99399exeexe_JC.exe 98 PID 4696 wrote to memory of 1388 4696 NA_NA_22418b85a99399exeexe_JC.exe 98 PID 1896 wrote to memory of 3060 1896 cmd.exe 105 PID 1896 wrote to memory of 3060 1896 cmd.exe 105 PID 1896 wrote to memory of 3060 1896 cmd.exe 105 PID 4532 wrote to memory of 2364 4532 cmd.exe 104 PID 4532 wrote to memory of 2364 4532 cmd.exe 104 PID 4532 wrote to memory of 2364 4532 cmd.exe 104 PID 1388 wrote to memory of 3400 1388 cmd.exe 106 PID 1388 wrote to memory of 3400 1388 cmd.exe 106 PID 1388 wrote to memory of 3400 1388 cmd.exe 106 PID 3060 wrote to memory of 736 3060 NA_NA_22418b85a99399exeexe_JC.exe 107 PID 3060 wrote to memory of 736 3060 NA_NA_22418b85a99399exeexe_JC.exe 107 PID 3060 wrote to memory of 736 3060 NA_NA_22418b85a99399exeexe_JC.exe 107 PID 736 wrote to memory of 4352 736 cmd.exe 109 PID 736 wrote to memory of 4352 736 cmd.exe 109 PID 736 wrote to memory of 4352 736 cmd.exe 109 PID 3060 wrote to memory of 1364 3060 NA_NA_22418b85a99399exeexe_JC.exe 110 PID 3060 wrote to memory of 1364 3060 NA_NA_22418b85a99399exeexe_JC.exe 110 PID 3060 wrote to memory of 1364 3060 NA_NA_22418b85a99399exeexe_JC.exe 110 PID 3060 wrote to memory of 4700 3060 NA_NA_22418b85a99399exeexe_JC.exe 113 PID 3060 wrote to memory of 4700 3060 NA_NA_22418b85a99399exeexe_JC.exe 113 PID 3060 wrote to memory of 4700 3060 NA_NA_22418b85a99399exeexe_JC.exe 113 PID 3060 wrote to memory of 2020 3060 NA_NA_22418b85a99399exeexe_JC.exe 112 PID 3060 wrote to memory of 2020 3060 NA_NA_22418b85a99399exeexe_JC.exe 112 PID 3060 wrote to memory of 2020 3060 NA_NA_22418b85a99399exeexe_JC.exe 112 PID 3060 wrote to memory of 4196 3060 NA_NA_22418b85a99399exeexe_JC.exe 111 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\ViUkUcIs\YicsMsoA.exe"C:\Users\Admin\ViUkUcIs\YicsMsoA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2196 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "USERNAME eq Admin" /F /IM rcUoUwkI.exe3⤵
- Kills process with taskkill
PID:3712 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1292
-
-
-
C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1288
-
-
-
C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"8⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"10⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"12⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"14⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"16⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC17⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"18⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"20⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"22⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC23⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"24⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC25⤵PID:908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"26⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC27⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"28⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"30⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"32⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC33⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"34⤵PID:3720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵
- UAC bypass
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC35⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"36⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC37⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"38⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC39⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"40⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC41⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"42⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC43⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"44⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC45⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"46⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC47⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"48⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC49⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"50⤵PID:4348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC51⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"52⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC53⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"54⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC55⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"56⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC57⤵
- Checks whether UAC is enabled
- System policy modification
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"58⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC59⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"60⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC61⤵PID:2244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"62⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC63⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"64⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC65⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"66⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC67⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"68⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC69⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"70⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC71⤵
- Checks whether UAC is enabled
- System policy modification
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"72⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC73⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"74⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC75⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"76⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC77⤵PID:1760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"78⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC79⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"80⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC81⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"82⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC83⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"84⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC85⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"86⤵PID:3660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC87⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"88⤵PID:2748
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵
- Modifies visibility of file extensions in Explorer
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC89⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"90⤵PID:5040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC91⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"92⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC93⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"94⤵PID:1300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC95⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"96⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC97⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"98⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC99⤵PID:1492
-
C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"C:\ProgramData\jSUwUkAI\rcUoUwkI.exe"100⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"100⤵PID:932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC101⤵
- Checks whether UAC is enabled
- System policy modification
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"102⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC103⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"104⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC105⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"106⤵PID:2000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵
- Modifies visibility of file extensions in Explorer
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC107⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"108⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC109⤵PID:932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"110⤵
- Modifies visibility of file extensions in Explorer
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC111⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"112⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC113⤵PID:656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"114⤵PID:2044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC115⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"116⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC117⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"118⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC119⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"120⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC121⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"122⤵PID:3088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-