Malware Analysis Report

2025-08-11 06:15

Sample ID 231118-hkhneace37
Target NEAS.98a305d83b5bcde92d88eb5f246240c0.exe
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
Tags
rat dcrat evasion infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300

Threat Level: Known bad

The file NEAS.98a305d83b5bcde92d88eb5f246240c0.exe was found to be: Known bad.

Malicious Activity Summary

rat dcrat evasion infostealer trojan

DcRat

DCRat payload

Dcrat family

UAC bypass

Process spawned unexpected child process

DCRat payload

Checks computer location settings

Executes dropped EXE

Checks whether UAC is enabled

Drops file in System32 directory

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

System policy modification

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-11-18 06:47

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-11-18 06:47

Reported

2023-11-18 06:50

Platform

win7-20231020-en

Max time kernel

153s

Max time network

174s

Command Line

"C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\dwm.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Uninstall Information\audiodg.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\RCXE5E4.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\RCXE5F5.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Uninstall Information\RCXE819.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\services.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\Adobe\27d1bcfc3c54e0 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\c5b4cb5e9653cc C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\Internet Explorer\en-US\dwm.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Internet Explorer\en-US\RCXF57D.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\Uninstall Information\42af1c969fbb7b C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\services.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RCXF368.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Internet Explorer\en-US\RCXF57C.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Internet Explorer\en-US\dwm.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\Adobe\System.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\Internet Explorer\en-US\6cb0b6c459d5d3 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\System.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Uninstall Information\RCXE808.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\Uninstall Information\audiodg.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RCXF369.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Vss\Writers\System\RCXF155.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\AppPatch\fr-FR\lsass.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\debug\WIA\RCXE3B1.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\debug\WIA\RCXE3B2.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\debug\WIA\dllhost.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\AppPatch\fr-FR\RCXECEC.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\AppPatch\fr-FR\RCXECED.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\AppPatch\fr-FR\lsass.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\Vss\Writers\System\RCXF144.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\Vss\Writers\System\lsass.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\debug\WIA\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\AppPatch\fr-FR\6203df4a6bafc7 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\Vss\Writers\System\6203df4a6bafc7 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\Vss\Writers\System\lsass.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\debug\WIA\dllhost.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
N/A N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2264 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 528 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 528 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 528 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2264 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\cmd.exe
PID 2264 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\cmd.exe
PID 2264 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\cmd.exe
PID 1980 wrote to memory of 848 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1980 wrote to memory of 848 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1980 wrote to memory of 848 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1980 wrote to memory of 2904 N/A C:\Windows\System32\cmd.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 1980 wrote to memory of 2904 N/A C:\Windows\System32\cmd.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 1980 wrote to memory of 2904 N/A C:\Windows\System32\cmd.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2904 wrote to memory of 2136 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2904 wrote to memory of 2136 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2904 wrote to memory of 2136 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2904 wrote to memory of 2344 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2904 wrote to memory of 2344 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2904 wrote to memory of 2344 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2136 wrote to memory of 2868 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2136 wrote to memory of 2868 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2136 wrote to memory of 2868 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2868 wrote to memory of 2872 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2868 wrote to memory of 2872 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2868 wrote to memory of 2872 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2868 wrote to memory of 1084 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2868 wrote to memory of 1084 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2868 wrote to memory of 1084 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe
PID 2872 wrote to memory of 848 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2872 wrote to memory of 848 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 2872 wrote to memory of 848 N/A C:\Windows\System32\WScript.exe C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe
PID 848 wrote to memory of 1176 N/A C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe C:\Windows\System32\WScript.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe

"C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\WIA\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\debug\WIA\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\debug\WIA\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Uninstall Information\audiodg.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\audiodg.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Uninstall Information\audiodg.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\fr-FR\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\AppPatch\fr-FR\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Windows\AppPatch\fr-FR\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Recovery\63bfbcc2-6fc3-11ee-a99b-e9009f524de1\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\63bfbcc2-6fc3-11ee-a99b-e9009f524de1\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Recovery\63bfbcc2-6fc3-11ee-a99b-e9009f524de1\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\System\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\System\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\System\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\services.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\services.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\services.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\en-US\dwm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\en-US\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\en-US\dwm.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z0umrEhMBq.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

"C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7860a71e-2d6b-4df2-a91c-ba19937097f8.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aafa2234-5139-432f-9f58-76ad4a340968.vbs"

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

"C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9e326810-9039-4469-93ea-3498edb60573.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b56169be-2461-410c-b1a0-680a1499b4d5.vbs"

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

"C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0aed9f3b-04dc-4541-b8db-52524691d17d.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\63a2e3ee-5d39-402c-abe1-de13680f406d.vbs"

Network

Country Destination Domain Proto
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp

Files

memory/2264-0-0x0000000000D20000-0x0000000000E8C000-memory.dmp

memory/2264-1-0x000007FEF5A10000-0x000007FEF63FC000-memory.dmp

memory/2264-2-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-3-0x00000000002B0000-0x00000000002BE000-memory.dmp

memory/2264-4-0x00000000002C0000-0x00000000002C8000-memory.dmp

memory/2264-5-0x00000000004A0000-0x00000000004BC000-memory.dmp

memory/2264-6-0x0000000000450000-0x0000000000458000-memory.dmp

memory/2264-7-0x00000000004C0000-0x00000000004D0000-memory.dmp

memory/2264-8-0x00000000004D0000-0x00000000004E6000-memory.dmp

memory/2264-9-0x00000000004F0000-0x0000000000500000-memory.dmp

memory/2264-10-0x0000000000500000-0x000000000050A000-memory.dmp

memory/2264-11-0x0000000000460000-0x000000000046C000-memory.dmp

memory/2264-12-0x0000000000470000-0x000000000047C000-memory.dmp

memory/2264-13-0x0000000000480000-0x0000000000488000-memory.dmp

memory/2264-14-0x0000000000490000-0x000000000049C000-memory.dmp

memory/2264-15-0x0000000000510000-0x0000000000518000-memory.dmp

memory/2264-16-0x0000000000630000-0x000000000063A000-memory.dmp

memory/2264-17-0x0000000000640000-0x000000000064E000-memory.dmp

memory/2264-18-0x0000000000650000-0x0000000000658000-memory.dmp

memory/2264-19-0x0000000000660000-0x000000000066E000-memory.dmp

memory/2264-20-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-21-0x0000000000670000-0x000000000067C000-memory.dmp

memory/2264-22-0x0000000000680000-0x0000000000688000-memory.dmp

memory/2264-23-0x0000000000690000-0x000000000069A000-memory.dmp

memory/2264-24-0x00000000008B0000-0x00000000008BC000-memory.dmp

memory/2264-33-0x000000001B1F0000-0x000000001B270000-memory.dmp

C:\Program Files (x86)\Uninstall Information\audiodg.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

memory/2264-44-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-49-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-68-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-93-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-106-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-118-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-143-0x000007FEF5A10000-0x000007FEF63FC000-memory.dmp

memory/2264-144-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-157-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-158-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-183-0x000000001B1F0000-0x000000001B270000-memory.dmp

memory/2264-184-0x000000001B1F0000-0x000000001B270000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J92BH18EH3PAUOYHWNGD.temp

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

memory/2644-221-0x000000001B370000-0x000000001B652000-memory.dmp

memory/2264-224-0x000007FEF5A10000-0x000007FEF63FC000-memory.dmp

memory/2348-225-0x0000000002310000-0x0000000002318000-memory.dmp

memory/2348-223-0x0000000002920000-0x00000000029A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\z0umrEhMBq.bat

MD5 1dc3e13bc9b4b4d2c0c91c633d0cf964
SHA1 b985c1370d958339bb040987b8fa9fda97a2edc9
SHA256 53627f5a90e90a913621b9964dfb10d8a294235a9d4ad71d382b0e57e788289a
SHA512 a46f3be5bcd840a6adf026c09d9dc9e86610ef71e1b7deaf90b051698260a802b11233b789ca31d17036a1c1e16d569e8cc5ea74019e04ce6c916bdb7763d65a

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c2b142655c2607eed6587ad985674f8e
SHA1 b69d903163fb9eaec73228d734422d225c935ddd
SHA256 62c691bdc6975842e23fdeff570a471440ede47f4316d23ec63fbaf2fc48a02a
SHA512 aa24abb8090d3eebc4634805fae899a612ed132f29e94002f4004c46c18a934c2bc7637bd92e9aba5a4ee1a501aeb1b29a1e07b9e4fbcf2ae8aa5237bd3769c1

memory/2584-267-0x00000000026FB000-0x0000000002762000-memory.dmp

memory/2644-266-0x0000000002974000-0x0000000002977000-memory.dmp

memory/2644-268-0x000000000297B000-0x00000000029E2000-memory.dmp

memory/1720-269-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/2584-272-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/1720-270-0x0000000002870000-0x00000000028F0000-memory.dmp

memory/2644-271-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/2644-273-0x0000000002970000-0x00000000029F0000-memory.dmp

memory/2584-275-0x00000000026F4000-0x00000000026F7000-memory.dmp

memory/1720-274-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/1720-276-0x0000000002870000-0x00000000028F0000-memory.dmp

memory/1720-277-0x0000000002870000-0x00000000028F0000-memory.dmp

memory/2348-279-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/1720-278-0x000000000287B000-0x00000000028E2000-memory.dmp

memory/2348-280-0x0000000002920000-0x00000000029A0000-memory.dmp

memory/2468-281-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

memory/2468-282-0x00000000029D0000-0x0000000002A50000-memory.dmp

memory/2348-283-0x000000000292B000-0x0000000002992000-memory.dmp

memory/2468-284-0x00000000029D0000-0x0000000002A50000-memory.dmp

memory/2468-285-0x00000000029D0000-0x0000000002A50000-memory.dmp

memory/2468-286-0x00000000029DB000-0x0000000002A42000-memory.dmp

memory/2300-287-0x000007FEED7E0000-0x000007FEEE17D000-memory.dmp

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\7860a71e-2d6b-4df2-a91c-ba19937097f8.vbs

MD5 e2e573702ab62fbee69fd1a933ec31be
SHA1 4ea4ab50358a4317817947f2999378a4137d4bc0
SHA256 ad227783a4cd8dbef6d7dcbef6e83ab65d176cf6865f2e7a08a0c553a2376cb1
SHA512 ac11daf43de7f5e378ac306f216785bd502d72c77ce029dc10de2e4d3a2d3d34069895e49bfad3b17d0cef4cbc1967626e31b9fe5921f5b054f3d5791ed4f402

C:\Users\Admin\AppData\Local\Temp\aafa2234-5139-432f-9f58-76ad4a340968.vbs

MD5 a310f0e7988cd8c7a4ecad3bd0a30f3c
SHA1 bc3a978c474b21c19851481946dcae4ff59c97ea
SHA256 84dd5a2fa8fe69118db428d2dd9ace2a2e537a6c2dec9aaadaac819a4cb74a63
SHA512 a6e313b2a96c7beb5857834c670b88cc56a134438e519a4110df10836dea9bf1341704a7b2cb9fdd88b4de1b262ceaab4f4582dced8d104055ffea9c6748aec4

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\bd7233fd2d54a5b73203a099df96a8243a31c250.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\b56169be-2461-410c-b1a0-680a1499b4d5.vbs

MD5 a310f0e7988cd8c7a4ecad3bd0a30f3c
SHA1 bc3a978c474b21c19851481946dcae4ff59c97ea
SHA256 84dd5a2fa8fe69118db428d2dd9ace2a2e537a6c2dec9aaadaac819a4cb74a63
SHA512 a6e313b2a96c7beb5857834c670b88cc56a134438e519a4110df10836dea9bf1341704a7b2cb9fdd88b4de1b262ceaab4f4582dced8d104055ffea9c6748aec4

C:\Users\Admin\AppData\Local\Temp\9e326810-9039-4469-93ea-3498edb60573.vbs

MD5 a464a6c512448e148490f6cd92df58f6
SHA1 aa3b8a406b14623c76dfeca3cae824a6bf79bc4e
SHA256 8b564f3fe57c3040664e026261aa782cc776ae57dfa84b98c1edfa5c83cc63d1
SHA512 46049ab71aa6f808eebcb0b42874a34af590fef45fecab342b58446cbdd666180ed3f68c8c4d8ebfbb66d2e2828342737e32ae8f221485ab6351750795b95a6b

C:\Users\Admin\AppData\Local\Temp\b56169be-2461-410c-b1a0-680a1499b4d5.vbs

MD5 a310f0e7988cd8c7a4ecad3bd0a30f3c
SHA1 bc3a978c474b21c19851481946dcae4ff59c97ea
SHA256 84dd5a2fa8fe69118db428d2dd9ace2a2e537a6c2dec9aaadaac819a4cb74a63
SHA512 a6e313b2a96c7beb5857834c670b88cc56a134438e519a4110df10836dea9bf1341704a7b2cb9fdd88b4de1b262ceaab4f4582dced8d104055ffea9c6748aec4

C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\bd7233fd2d54a5b73203a099df96a8243a31c250.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\0aed9f3b-04dc-4541-b8db-52524691d17d.vbs

MD5 83c3602434fd0273fe7d49f0559ed97b
SHA1 0f359f0a9d989b315d2a239bef17d3e8ed81eb73
SHA256 81de3de914075cd958d89df9dbfc569e84b5439037a584c22561134258ae0e39
SHA512 aa8c7e68fd797b11835973826d0887f7e3aa079f64d7cc725f06e3479c765d9d9dea537f13c9ed09a3e40fb22037413da8b62880b6cfb65e51b2e9c748fe5133

C:\Users\Admin\AppData\Local\Temp\63a2e3ee-5d39-402c-abe1-de13680f406d.vbs

MD5 a310f0e7988cd8c7a4ecad3bd0a30f3c
SHA1 bc3a978c474b21c19851481946dcae4ff59c97ea
SHA256 84dd5a2fa8fe69118db428d2dd9ace2a2e537a6c2dec9aaadaac819a4cb74a63
SHA512 a6e313b2a96c7beb5857834c670b88cc56a134438e519a4110df10836dea9bf1341704a7b2cb9fdd88b4de1b262ceaab4f4582dced8d104055ffea9c6748aec4

Analysis: behavioral2

Detonation Overview

Submitted

2023-11-18 06:47

Reported

2023-11-18 06:50

Platform

win10v2004-20231020-en

Max time kernel

151s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation C:\odt\RuntimeBroker.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation C:\odt\RuntimeBroker.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation C:\odt\RuntimeBroker.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\odt\RuntimeBroker.exe N/A
N/A N/A C:\odt\RuntimeBroker.exe N/A
N/A N/A C:\odt\RuntimeBroker.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\odt\RuntimeBroker.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\27d1bcfc3c54e0 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\RCXA09F.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\RCXA2C4.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RCXA809.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\Idle.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\System.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\sysmon.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\121e5b5079f7c0 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\WindowsPowerShell\fcabf9775b473e C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\RCXA556.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\RCXA567.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\RCXAFEE.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\System.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\7-Zip\Lang\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\7-Zip\Lang\38384e6a620884 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\Idle.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\RCXA0B0.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\RCXAFCE.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\sysmon.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\RCXA313.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\RCXA78B.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\CSC\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\38384e6a620884 C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\RCX9BC9.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\RCX9BE9.tmp C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings C:\odt\RuntimeBroker.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings C:\odt\RuntimeBroker.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings C:\odt\RuntimeBroker.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3892 wrote to memory of 1412 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 1412 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4808 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4808 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4940 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4940 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4928 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4928 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 736 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 1112 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 1112 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3892 wrote to memory of 1560 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\cmd.exe
PID 3892 wrote to memory of 1560 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe C:\Windows\System32\cmd.exe
PID 1560 wrote to memory of 2968 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1560 wrote to memory of 2968 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1560 wrote to memory of 5604 N/A C:\Windows\System32\cmd.exe C:\odt\RuntimeBroker.exe
PID 1560 wrote to memory of 5604 N/A C:\Windows\System32\cmd.exe C:\odt\RuntimeBroker.exe
PID 5604 wrote to memory of 5872 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5604 wrote to memory of 5872 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5604 wrote to memory of 5920 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5604 wrote to memory of 5920 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5872 wrote to memory of 1112 N/A C:\Windows\System32\WScript.exe C:\odt\RuntimeBroker.exe
PID 5872 wrote to memory of 1112 N/A C:\Windows\System32\WScript.exe C:\odt\RuntimeBroker.exe
PID 1112 wrote to memory of 1236 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 1112 wrote to memory of 1236 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 1112 wrote to memory of 3764 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 1112 wrote to memory of 3764 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 1236 wrote to memory of 5052 N/A C:\Windows\System32\WScript.exe C:\odt\RuntimeBroker.exe
PID 1236 wrote to memory of 5052 N/A C:\Windows\System32\WScript.exe C:\odt\RuntimeBroker.exe
PID 5052 wrote to memory of 3260 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5052 wrote to memory of 3260 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5052 wrote to memory of 4584 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe
PID 5052 wrote to memory of 4584 N/A C:\odt\RuntimeBroker.exe C:\Windows\System32\WScript.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\odt\RuntimeBroker.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\odt\RuntimeBroker.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe

"C:\Users\Admin\AppData\Local\Temp\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Application Data\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Application Data\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Application Data\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Favorites\backgroundTaskHost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Default\Favorites\backgroundTaskHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Favorites\backgroundTaskHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\odt\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "NEAS.98a305d83b5bcde92d88eb5f246240c0N" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "NEAS.98a305d83b5bcde92d88eb5f246240c0" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "NEAS.98a305d83b5bcde92d88eb5f246240c0N" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\odt\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\odt\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\WindowsPowerShell\sysmon.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\sysmon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\sysmon.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wMDGCgjXWp.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\odt\RuntimeBroker.exe

"C:\odt\RuntimeBroker.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\39c3734c-919f-467f-83b6-4dd07532cd75.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3b287959-da34-418f-835c-f36457dc3e1a.vbs"

C:\odt\RuntimeBroker.exe

C:\odt\RuntimeBroker.exe

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d6841ae9-9577-4b12-acc7-e4c5d442b2b2.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e75cd97f-67fe-4efd-90c6-d056866d4fd9.vbs"

C:\odt\RuntimeBroker.exe

C:\odt\RuntimeBroker.exe

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9d3a917f-cb18-441c-a623-952574bfe858.vbs"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8f03dc43-bda4-4e43-b04a-ac51d98cf1f0.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 122.175.53.84.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 138.175.53.84.in-addr.arpa udp
UA 77.123.31.10:8080 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
UA 77.123.31.10:8080 tcp
UA 77.123.31.10:8080 tcp
US 8.8.8.8:53 126.23.238.8.in-addr.arpa udp
UA 77.123.31.10:8080 tcp
US 8.8.8.8:53 14.173.189.20.in-addr.arpa udp
UA 77.123.31.10:8080 tcp

Files

memory/3892-0-0x0000000000090000-0x00000000001FC000-memory.dmp

memory/3892-1-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/3892-2-0x000000001AFB0000-0x000000001AFC0000-memory.dmp

memory/3892-3-0x0000000002310000-0x000000000231E000-memory.dmp

memory/3892-4-0x0000000002320000-0x0000000002328000-memory.dmp

memory/3892-5-0x0000000002330000-0x000000000234C000-memory.dmp

memory/3892-6-0x00000000023E0000-0x0000000002430000-memory.dmp

memory/3892-7-0x0000000002350000-0x0000000002358000-memory.dmp

memory/3892-8-0x0000000002360000-0x0000000002370000-memory.dmp

memory/3892-9-0x0000000002390000-0x00000000023A6000-memory.dmp

memory/3892-10-0x0000000002370000-0x0000000002380000-memory.dmp

memory/3892-11-0x00000000023B0000-0x00000000023BA000-memory.dmp

memory/3892-12-0x00000000023C0000-0x00000000023CC000-memory.dmp

memory/3892-13-0x00000000023D0000-0x00000000023DC000-memory.dmp

memory/3892-14-0x0000000002430000-0x0000000002438000-memory.dmp

memory/3892-15-0x0000000002440000-0x000000000244C000-memory.dmp

memory/3892-16-0x000000001AF70000-0x000000001AF78000-memory.dmp

memory/3892-18-0x000000001AFB0000-0x000000001AFC0000-memory.dmp

memory/3892-20-0x000000001AF90000-0x000000001AF9E000-memory.dmp

memory/3892-19-0x000000001AFB0000-0x000000001AFC0000-memory.dmp

memory/3892-17-0x000000001AF80000-0x000000001AF8A000-memory.dmp

memory/3892-21-0x000000001AFA0000-0x000000001AFA8000-memory.dmp

memory/3892-22-0x000000001B6C0000-0x000000001B6CE000-memory.dmp

memory/3892-23-0x000000001B6D0000-0x000000001B6DC000-memory.dmp

memory/3892-24-0x000000001B6E0000-0x000000001B6E8000-memory.dmp

memory/3892-25-0x000000001B6F0000-0x000000001B6FA000-memory.dmp

memory/3892-26-0x00000000022D0000-0x00000000022DC000-memory.dmp

memory/3892-29-0x000000001AFB0000-0x000000001AFC0000-memory.dmp

memory/3892-34-0x000000001AFB0000-0x000000001AFC0000-memory.dmp

C:\Program Files\WindowsPowerShell\NEAS.98a305d83b5bcde92d88eb5f246240c0.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

memory/3892-115-0x000000001C1A0000-0x000000001C2A0000-memory.dmp

memory/3892-189-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4940-191-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4940-192-0x0000022B22210000-0x0000022B22220000-memory.dmp

memory/3892-193-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4940-194-0x0000022B22210000-0x0000022B22220000-memory.dmp

memory/736-195-0x0000012F367B0000-0x0000012F367C0000-memory.dmp

memory/736-196-0x0000012F367B0000-0x0000012F367C0000-memory.dmp

memory/4552-197-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4940-207-0x0000022B22320000-0x0000022B22342000-memory.dmp

memory/576-208-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4452-219-0x000001F593FE0000-0x000001F593FF0000-memory.dmp

memory/4452-218-0x000001F593FE0000-0x000001F593FF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ovskrcxn.hm1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4808-301-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4808-302-0x000001F6ECAB0000-0x000001F6ECAC0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\wMDGCgjXWp.bat

MD5 a21f17d02b1def5d55ac6adcd882cd7f
SHA1 0fb81d02696237f0fa603bbb2ca8390e6c680477
SHA256 8607fb3334b59f1529aa369674faacacf8b00150d71680eecc1151bd1b9c9856
SHA512 733e65b193fd522da74c688d239ac4aa06d32cede82e2a0220f89858975b9681d3d31251dedd1c01e245b7644ac547e9da0803e82c07c4e928b5809cdf6c230f

memory/1412-313-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/1412-314-0x0000016BC7940000-0x0000016BC7950000-memory.dmp

memory/1412-316-0x0000016BC7940000-0x0000016BC7950000-memory.dmp

memory/2896-315-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/2896-317-0x00000273F0090000-0x00000273F00A0000-memory.dmp

memory/2524-318-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/2300-319-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/2524-320-0x000002812C8A0000-0x000002812C8B0000-memory.dmp

memory/2300-321-0x0000015C22990000-0x0000015C229A0000-memory.dmp

memory/2524-322-0x000002812C8A0000-0x000002812C8B0000-memory.dmp

memory/2300-323-0x0000015C22990000-0x0000015C229A0000-memory.dmp

memory/4928-324-0x00007FF86B010000-0x00007FF86BAD1000-memory.dmp

memory/4928-325-0x0000024F9A8E0000-0x0000024F9A8F0000-memory.dmp

memory/4940-327-0x0000022B22210000-0x0000022B22220000-memory.dmp

memory/4452-326-0x000001F593FE0000-0x000001F593FF0000-memory.dmp

memory/2896-328-0x00000273F0090000-0x00000273F00A0000-memory.dmp

memory/4552-329-0x000001F8015D0000-0x000001F8015E0000-memory.dmp

memory/4928-330-0x0000024F9A8E0000-0x0000024F9A8F0000-memory.dmp

memory/576-331-0x00000135C69B0000-0x00000135C69C0000-memory.dmp

memory/2524-332-0x000002812C8A0000-0x000002812C8B0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e243a38635ff9a06c87c2a61a2200656
SHA1 ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256 af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA512 4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e8ce785f8ccc6d202d56fefc59764945
SHA1 ca032c62ddc5e0f26d84eff9895eb87f14e15960
SHA256 d85c19fc6b9d25e2168a2cc50ff38bd226fbf4f02aa7ac038a5f319522d2ffa4
SHA512 66460aec4afee582556270f8ee6048d130a090f1c12a2632ed71a99a4073e9931e9e1cc286e32debffb95a90bd955f0f0d6ec891b1c5cd2f0aae41eb6d25832f

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 9c97a801bb5d6c21c265ab7f283ba83e
SHA1 7c0a4cb73d63702a2d454268d983e0dcb36a8bf8
SHA256 69d9676a8c93686c904d9ce6193221476d6c72bc4d3250a232c03ccbeae380c7
SHA512 d3abd8bfccd3a3fec55c13e85e755fbd589e6ea04321169c7c8cf5badf7b6ffe96c0c2ed449a0b4a99ecfd1e7bb7edc3311d335c8956cf344c9584fb0bda50d9

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 9c97a801bb5d6c21c265ab7f283ba83e
SHA1 7c0a4cb73d63702a2d454268d983e0dcb36a8bf8
SHA256 69d9676a8c93686c904d9ce6193221476d6c72bc4d3250a232c03ccbeae380c7
SHA512 d3abd8bfccd3a3fec55c13e85e755fbd589e6ea04321169c7c8cf5badf7b6ffe96c0c2ed449a0b4a99ecfd1e7bb7edc3311d335c8956cf344c9584fb0bda50d9

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 aaaac7c68d2b7997ed502c26fd9f65c2
SHA1 7c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA256 8724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512 c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e8ce785f8ccc6d202d56fefc59764945
SHA1 ca032c62ddc5e0f26d84eff9895eb87f14e15960
SHA256 d85c19fc6b9d25e2168a2cc50ff38bd226fbf4f02aa7ac038a5f319522d2ffa4
SHA512 66460aec4afee582556270f8ee6048d130a090f1c12a2632ed71a99a4073e9931e9e1cc286e32debffb95a90bd955f0f0d6ec891b1c5cd2f0aae41eb6d25832f

C:\odt\RuntimeBroker.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\odt\RuntimeBroker.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\39c3734c-919f-467f-83b6-4dd07532cd75.vbs

MD5 c467ff65b187b1eeeb68471b1c175189
SHA1 dcc16520c068f9564f0aa06a0881d1b7a14c9057
SHA256 9dc90f3d5cbaea4e90416af70d69acf783ffe09500ea36d7a8a37ced9046ea76
SHA512 0651d63c0af029f270f93010079e5f642328f94aff292a1400fa6c35808a9df7fe9bab677e9d711a5960088944109461d29e507c5bd6756e8b1ed0e528acd340

C:\Users\Admin\AppData\Local\Temp\3b287959-da34-418f-835c-f36457dc3e1a.vbs

MD5 22f5348b6ea434796666f39301c55d3a
SHA1 598f002e948d94de366fd33be64b1e04273e94ac
SHA256 8aefba68bbbf5b455026bc25301887fe4333b6cef83a7d422dbe35f686678196
SHA512 62ba5cc99317fcc387cedbc057408d6f2c7b9ce17fff06abd591cce6520def3afe845fce982626f5590c67313584f4fc1c8a960fa52a1cbc806d173c290d108a

C:\odt\RuntimeBroker.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log

MD5 9b0256da3bf9a5303141361b3da59823
SHA1 d73f34951777136c444eb2c98394f62912ebcdac
SHA256 96cbc3f4e49d7ae13cd46e36ebb4819b6db1eabe5db910902638c1a24947208e
SHA512 9f014fef4b1bb71dbdd1d0bad11bd20437a9801eaa830ab386f901f6b5be374a26f68161d7638ea03483028e9a56bf97023cc24b45356a9c76cb755a53d9c164

C:\Users\Admin\AppData\Local\Temp\d6841ae9-9577-4b12-acc7-e4c5d442b2b2.vbs

MD5 9b326998535447de043175bb78c2f4c2
SHA1 004e1bff2db8a761d374a0637e92fa746f6e20f1
SHA256 55e78b1224cb859da1a97daae15566e317985fc224fdf9a09de491a2d1d48ed6
SHA512 5c05bef7c6e5132d5d417b71f05768938caf9974324c75573888f0c1e682abb1a8c92e223294def3d76fa7ee0012f818a16dbd603294552e36660e9c4fd9f066

C:\Users\Admin\AppData\Local\Temp\e75cd97f-67fe-4efd-90c6-d056866d4fd9.vbs

MD5 22f5348b6ea434796666f39301c55d3a
SHA1 598f002e948d94de366fd33be64b1e04273e94ac
SHA256 8aefba68bbbf5b455026bc25301887fe4333b6cef83a7d422dbe35f686678196
SHA512 62ba5cc99317fcc387cedbc057408d6f2c7b9ce17fff06abd591cce6520def3afe845fce982626f5590c67313584f4fc1c8a960fa52a1cbc806d173c290d108a

C:\Users\Admin\AppData\Local\Temp\838c2240ceaf51f4e1ea10f1e48c3a2d1612e317.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\e75cd97f-67fe-4efd-90c6-d056866d4fd9.vbs

MD5 22f5348b6ea434796666f39301c55d3a
SHA1 598f002e948d94de366fd33be64b1e04273e94ac
SHA256 8aefba68bbbf5b455026bc25301887fe4333b6cef83a7d422dbe35f686678196
SHA512 62ba5cc99317fcc387cedbc057408d6f2c7b9ce17fff06abd591cce6520def3afe845fce982626f5590c67313584f4fc1c8a960fa52a1cbc806d173c290d108a

C:\odt\RuntimeBroker.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\838c2240ceaf51f4e1ea10f1e48c3a2d1612e317.exe

MD5 98a305d83b5bcde92d88eb5f246240c0
SHA1 739903e2cb0bb1584fead08bcb41ada2db5bd85f
SHA256 d3b55401e08b14d4789e0940cb28c43024a7e9f2e743f87bd83a4619a4eef300
SHA512 cf69a0e74b8984f93282cae3465451eae18f05fa47b0712282fad98c56289fabb7adc91e268a4c84ea6504552107d624ee00980b8b47ea2e8971071a59128b0e

C:\Users\Admin\AppData\Local\Temp\9d3a917f-cb18-441c-a623-952574bfe858.vbs

MD5 8f7e10ae22e86c76a761bfb118a7a950
SHA1 32067ecc873803e6f9b5ed2aec24dfdd25032727
SHA256 df5846f665c668a5a81c975c846f07f9957c85c6498cb2f44923563e2380a2cb
SHA512 180b386caf723bbb08ef2530c8700f574468bbf3c8763f173ac994a8bde2e6de014e29b786d77b6ad151edda8a5897d861a9333aa6d40e2c12cbe2a78d31792f

C:\Users\Admin\AppData\Local\Temp\8f03dc43-bda4-4e43-b04a-ac51d98cf1f0.vbs

MD5 22f5348b6ea434796666f39301c55d3a
SHA1 598f002e948d94de366fd33be64b1e04273e94ac
SHA256 8aefba68bbbf5b455026bc25301887fe4333b6cef83a7d422dbe35f686678196
SHA512 62ba5cc99317fcc387cedbc057408d6f2c7b9ce17fff06abd591cce6520def3afe845fce982626f5590c67313584f4fc1c8a960fa52a1cbc806d173c290d108a