Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe
Resource
win10v2004-20231023-en
General
-
Target
0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe
-
Size
26.5MB
-
MD5
970f1757ccc0b60859d23302688359ee
-
SHA1
bbe7be423ba59b0e9872d4f8556b8a9f89d46204
-
SHA256
0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73
-
SHA512
ca1e1b4a018c730391b90b7b235932bc87b1aa331c1c8327d1aa510cb0c6eb49e7ed110703ae8b2c41e54c1f066d51fa691aff3e09c5cc7a22c3195bce23ff47
-
SSDEEP
6144:O3Te8ySm8hQAAIfFrRXuEE+0l97mKwKArOHV3j86JQPDHDdx/Qtqa:B/zkFF+EExZmKbciVTPJQPDHvd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wcjpy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wcjpy.exe -
Adds policy Run key to start application 2 TTPs 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "hcytrhdrsrndiagmpkgb.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "asldylepnjcprgjmm.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oevlepgplfwhhuv = "hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lymzpxlrkbpx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 wcjpy.exe 2712 wcjpy.exe -
Loads dropped DLL 4 IoCs
pid Process 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "asldylepnjcprgjmm.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "wsplkbynppmdjcjquqnji.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "uojdapkxxvqfjafkmgb.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwplztfebvjmcgkle.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "hcytrhdrsrndiagmpkgb.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "wsplkbynppmdjcjquqnji.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "hcytrhdrsrndiagmpkgb.exe ." 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "uojdapkxxvqfjafkmgb.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "jcwplztfebvjmcgkle.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwplztfebvjmcgkle.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "hcytrhdrsrndiagmpkgb.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwplztfebvjmcgkle.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "tkctnzrbytlxymoq.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "uojdapkxxvqfjafkmgb.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "tkctnzrbytlxymoq.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "asldylepnjcprgjmm.exe ." 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "tkctnzrbytlxymoq.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "wsplkbynppmdjcjquqnji.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\asldylepnjcprgjmm = "asldylepnjcprgjmm.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkctnzrbytlxymoq = "tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uojdapkxxvqfjafkmgb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asldylepnjcprgjmm.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "uojdapkxxvqfjafkmgb.exe ." wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jcwplztfebvjmcgkle = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hcytrhdrsrndiagmpkgb.exe ." wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wsplkbynppmdjcjquqnji.exe" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "jcwplztfebvjmcgkle.exe" wcjpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\kynbsbqxrjyhf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkctnzrbytlxymoq.exe" wcjpy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\laqfxhxfatjtse = "wsplkbynppmdjcjquqnji.exe ." wcjpy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 www.showmyipaddress.com 7 whatismyipaddress.com 14 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe File created C:\Windows\SysWOW64\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe File opened for modification C:\Windows\SysWOW64\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe File created C:\Windows\SysWOW64\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe File opened for modification C:\Program Files (x86)\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe File created C:\Program Files (x86)\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe File opened for modification C:\Program Files (x86)\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe File created C:\Windows\gkptazebltyxlmbqcglpwvaxh.uth wcjpy.exe File opened for modification C:\Windows\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe File created C:\Windows\laqfxhxfatjtseeebqgvnxnvqjzjiuuurgwl.ndl wcjpy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe 2712 wcjpy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 wcjpy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2604 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 28 PID 2096 wrote to memory of 2604 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 28 PID 2096 wrote to memory of 2604 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 28 PID 2096 wrote to memory of 2604 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 28 PID 2096 wrote to memory of 2712 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 29 PID 2096 wrote to memory of 2712 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 29 PID 2096 wrote to memory of 2712 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 29 PID 2096 wrote to memory of 2712 2096 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe 29 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" wcjpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wcjpy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wcjpy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe"C:\Users\Admin\AppData\Local\Temp\0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\wcjpy.exe"C:\Users\Admin\AppData\Local\Temp\wcjpy.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\wcjpy.exe"C:\Users\Admin\AppData\Local\Temp\wcjpy.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD5062cbc71698497a1e108bca11e1918e1
SHA1abaf94b62a04fc8b9321498456fb231fdc1dabc1
SHA256fb29bf08229dbb6ca1dae7d3eebd7827840333dd0bdf329bf62a00839f096965
SHA51232c942c3b94397a5e8adfb18c08360386e00e159455ddc3576bb67a71eca25b1afad81d13fa5e53030ff6b96116e93ed245d64589491eae250d78c9bbe2e5d2d
-
Filesize
272B
MD5348cbde50816de6508a78559c9185c75
SHA115be78ed1ee877aafdc858237232b3827015e735
SHA256c482a3a8f18f1cb392a5ea10ee5c66909447db1eff9be8068565e0689f352567
SHA51225e1c286581007c49062b9aa8e42b80633cb664fcfdf76d08344682f46ba351011fc3d69b449803878c4b8a8cc3e7957dec06790c2a577e775737f1a358d29f9
-
Filesize
272B
MD54e7bf9bda65a8caada070f1519a4b439
SHA13be849ecd48bd04aeccfe77af304f32adc176e00
SHA256c872cf46de5553fd4b945f48a6d8a22b0ae865a8545452e8e4ef382229c03cfc
SHA51231bc409c1bf2aa6c62164fbbd06370ef02c4e5482dbaf2ed658c85eb84f74b072e19ee1831898d504083b8023b76a4081ee9f782f518547e4e4be8712b641466
-
Filesize
272B
MD56b0b7d2a35982080bac47314ff339783
SHA16f75559eebbf782165cfe918b212a99b50f50a49
SHA2566a70c8b87d86bfea25a92741190ecc3449fddcd70a08aea50b958c7aa2b82b59
SHA512cefa02da3e95ae4d58ce45fe73af4b3605ebe31257331c790b126c4870f0ed5358b6c2ac8119183d1e5616575d0edf24f5a07dfc6ec6432f1d428e5aee961021
-
Filesize
272B
MD5bc5e346e75fe345f4c89ae02164ec3d0
SHA17af1d21f151549e5312fc9e59b742501123d3cb7
SHA25692cce4c492627858963e608c151c038c5ff9806200aea45e95667b2dcaac8557
SHA512803ca2dc406d46d6a2d0253f05194209e2b03c1ebbf5ecf94c02a937014ddd0fec7bca213ba5c1ce7c08060b906e218f32375456f312c4465d085eec20fb3a25
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
272B
MD507469a92eab60d37d457e620c1ba7397
SHA164832388b6d7efacd409c6e4ca4582dcce96e9ab
SHA2565a9976357a129632efaae3ac3fc8df7377e08331696ad791368db4797c2e68ee
SHA5124bb742351b1dddf068d36c92085c3f928110c60eb9f067bf8a288fc7f5bd95b5cdd9f609a11c4f1fef0722e2cff930d071b160567e5d7d70198bef387cd3c706
-
Filesize
272B
MD5c919c1a05af39a7bd1fd6394ef274e0e
SHA1718c009e04eb6eb29465e391639fe040495c7339
SHA2560cda115138d004a6915ef8130d1c9bee42a2a3e7afa5159fcdda45542f1c0b35
SHA51270e7ff94dab316d54d5379ca0d82d4104dc8708deda569cf57ae958f9c7ab62b92ab668f3e4f53d7d03f322b8f4b51afb52e84ccb18d12fc83036db17a1a8aeb
-
Filesize
3KB
MD5317d0b83455586dfb9fd4b9763fafcc4
SHA1116063a681cdee520b44c6d87b7169626e8127cc
SHA256fbb7a1282fbefaa52d5ded5d6138dbb626403a576fcca8c3c0d89d58f0ab1ba5
SHA512a0819791a2bd3ee3175951fd55586e6591666d653ea0bfa153332d1d542e51d019c8dea6ab5de5baa270ae120854126f3fac1076152479cab44f39c744494191
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051
-
Filesize
30.5MB
MD5c2d82571a875e1247f1e66540defb130
SHA1f32cfcccf47802c97fd02fd8219e17559faf181e
SHA2567f3f0c229a1f0109e9b510a1cd2471352bcd656968b71014639e1289e7efe90d
SHA5122ccf54003d4739421e3b902e946c44a1c7864e76c06c1692f43d2887a87be42b480527621779dccf4682caef7a2d3427b1419a40f5b92ee5afd2b28ff186a051