Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe
Resource
win10v2004-20240226-en
General
-
Target
a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe
-
Size
288KB
-
MD5
6ac26c66fc9332cde21f0b147f312e4f
-
SHA1
a92793d8926722300f0758db60b1b2ef00ed90f6
-
SHA256
a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595
-
SHA512
daa50cdb8046981d902d0b18f6e75ee3dc368ef6213a60c3654f07aacfaffe19a084e80604a698ee94551ed426d603965fe842e3cc1a425126034e9edba9156b
-
SSDEEP
6144:d3igRSBz5IIR+P2sz5SQUyi1VhEl7baEZlbYnHeo/FcwTXS+tA:dygRSBaosjUyiPhElyE/bYHB/FciX5A
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 50 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exe -
Executes dropped EXE 24 IoCs
pid Process 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe 756 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe 1684 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe 4912 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe 2772 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe\"" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649} a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ce14d143efccf2a8 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD1DE7DC-3AC1-13D1-B2E4-0060975B8649}\0 = 709ccce6dc72e9b4d28b69ee98b64d0c3f61a5645c a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: 33 4860 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Token: SeIncBasePriorityPrivilege 4860 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe Token: 33 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Token: SeIncBasePriorityPrivilege 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe Token: 33 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Token: SeIncBasePriorityPrivilege 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe Token: 33 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Token: SeIncBasePriorityPrivilege 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe Token: 33 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Token: SeIncBasePriorityPrivilege 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe Token: 33 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Token: SeIncBasePriorityPrivilege 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe Token: 33 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Token: SeIncBasePriorityPrivilege 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe Token: 33 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Token: SeIncBasePriorityPrivilege 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe Token: 33 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Token: SeIncBasePriorityPrivilege 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe Token: 33 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Token: SeIncBasePriorityPrivilege 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe Token: 33 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Token: SeIncBasePriorityPrivilege 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe Token: 33 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Token: SeIncBasePriorityPrivilege 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe Token: 33 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Token: SeIncBasePriorityPrivilege 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe Token: 33 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Token: SeIncBasePriorityPrivilege 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe Token: 33 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Token: SeIncBasePriorityPrivilege 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe Token: 33 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Token: SeIncBasePriorityPrivilege 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe Token: 33 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Token: SeIncBasePriorityPrivilege 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe Token: 33 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Token: SeIncBasePriorityPrivilege 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe Token: 33 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Token: SeIncBasePriorityPrivilege 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe Token: 33 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Token: SeIncBasePriorityPrivilege 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe Token: 33 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Token: SeIncBasePriorityPrivilege 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe Token: 33 756 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Token: SeIncBasePriorityPrivilege 756 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe Token: 33 1684 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Token: SeIncBasePriorityPrivilege 1684 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe Token: 33 4912 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe Token: SeIncBasePriorityPrivilege 4912 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2248 4860 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe 98 PID 4860 wrote to memory of 2248 4860 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe 98 PID 4860 wrote to memory of 2248 4860 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe 98 PID 2248 wrote to memory of 4452 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe 101 PID 2248 wrote to memory of 4452 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe 101 PID 2248 wrote to memory of 4452 2248 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe 101 PID 4452 wrote to memory of 964 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe 103 PID 4452 wrote to memory of 964 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe 103 PID 4452 wrote to memory of 964 4452 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe 103 PID 964 wrote to memory of 3592 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe 104 PID 964 wrote to memory of 3592 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe 104 PID 964 wrote to memory of 3592 964 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe 104 PID 3592 wrote to memory of 3956 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe 106 PID 3592 wrote to memory of 3956 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe 106 PID 3592 wrote to memory of 3956 3592 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe 106 PID 3956 wrote to memory of 4812 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe 111 PID 3956 wrote to memory of 4812 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe 111 PID 3956 wrote to memory of 4812 3956 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe 111 PID 4812 wrote to memory of 3448 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe 114 PID 4812 wrote to memory of 3448 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe 114 PID 4812 wrote to memory of 3448 4812 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe 114 PID 3448 wrote to memory of 3052 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe 115 PID 3448 wrote to memory of 3052 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe 115 PID 3448 wrote to memory of 3052 3448 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe 115 PID 3052 wrote to memory of 232 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe 116 PID 3052 wrote to memory of 232 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe 116 PID 3052 wrote to memory of 232 3052 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe 116 PID 232 wrote to memory of 3980 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe 117 PID 232 wrote to memory of 3980 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe 117 PID 232 wrote to memory of 3980 232 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe 117 PID 3980 wrote to memory of 2472 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe 118 PID 3980 wrote to memory of 2472 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe 118 PID 3980 wrote to memory of 2472 3980 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe 118 PID 2472 wrote to memory of 4316 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe 119 PID 2472 wrote to memory of 4316 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe 119 PID 2472 wrote to memory of 4316 2472 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe 119 PID 4316 wrote to memory of 4060 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe 121 PID 4316 wrote to memory of 4060 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe 121 PID 4316 wrote to memory of 4060 4316 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe 121 PID 4060 wrote to memory of 4212 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe 122 PID 4060 wrote to memory of 4212 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe 122 PID 4060 wrote to memory of 4212 4060 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe 122 PID 4212 wrote to memory of 4552 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe 123 PID 4212 wrote to memory of 4552 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe 123 PID 4212 wrote to memory of 4552 4212 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe 123 PID 4552 wrote to memory of 1416 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe 124 PID 4552 wrote to memory of 1416 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe 124 PID 4552 wrote to memory of 1416 4552 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe 124 PID 1416 wrote to memory of 2280 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe 125 PID 1416 wrote to memory of 2280 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe 125 PID 1416 wrote to memory of 2280 1416 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe 125 PID 2280 wrote to memory of 2752 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe 126 PID 2280 wrote to memory of 2752 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe 126 PID 2280 wrote to memory of 2752 2280 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe 126 PID 2752 wrote to memory of 1856 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe 127 PID 2752 wrote to memory of 1856 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe 127 PID 2752 wrote to memory of 1856 2752 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe 127 PID 1856 wrote to memory of 1404 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe 128 PID 1856 wrote to memory of 1404 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe 128 PID 1856 wrote to memory of 1404 1856 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe 128 PID 1404 wrote to memory of 756 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe 129 PID 1404 wrote to memory of 756 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe 129 PID 1404 wrote to memory of 756 1404 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe 129 PID 756 wrote to memory of 1684 756 a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe"C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe9⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe11⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe13⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe14⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe15⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe17⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe19⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe20⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe21⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe23⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202v.exe24⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exec:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202w.exe25⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD5ae6a2ba007af53269c61714925758b7d
SHA16adbdd6dd6949cc28107c9ad7f7553c7180eff12
SHA2568015833ab4b86d0bc44b30f7c48cbf837c6e4e3a0d7806f8c7e478bff8da43b2
SHA512662816a1b4c28d88268c094105888bab136c30fc2a19d3302b7f1da1ec681371ed34edd7bcffc9472842f7923b1546096051e24dbdc9d9e4f826f6d9516b47ac
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202.exe
Filesize288KB
MD5d9a56e88e6b69ebc58492cb1447002a6
SHA189147b1407bbea850c6bbd992aebe029dbf5d98d
SHA256eca303edd30ba298208e770d20e8748ad2e8962d849be3caa538320fe54a0940
SHA5124faf7c88927f0a3e2a7c2fdf699c0133c01726e15a4207c3f9bf7627bffee7b906240f35f15fb4a12f476c016867659dcff7d18d0067bbba71727e8746bc6dfd
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202b.exe
Filesize288KB
MD593bab6d868745e18750f83cbd1b14e3e
SHA150bbd8ced5077f54a5e962686a994e14281d526b
SHA256d561b4b410bc94d936bb2009b399c76a2f79a0f75ec6171e227323a1b0d504fa
SHA512a81add173be0add3a682d177c641ba7abdba68e03a494b9513d9eca6a9194b2259c870ee4ce59e100e118755f0bd3c8e56addf2ee5e47891f0e430390f5e18af
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202c.exe
Filesize288KB
MD5326b66b3713619e4f0517b79bc509a67
SHA1b56973e8224393211dc241ae8ca5ef7aa07c650b
SHA256131a260d476461ff12f41489abbd5a81b6aaefc7155d7a7de1ad29abcf80f771
SHA512d0e289b2b4ac98d975ecbeed67831b750040fc01a36433663744fd721a26daab0ea4561b0194d49e3ab659de707d73fc4d623cbd6ff7f0b3d71d9e6738754366
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202d.exe
Filesize288KB
MD51d41452c1c13a6ea61cbe36e52aa85f2
SHA12ab8dfb591a546821f7a8cec8b6acd1599e651a4
SHA2568fff86437949666da4de66908e4d51fa8c7225784c17d1b89f14d20aada3f81c
SHA512ea985852b27e47953aa0c23e0a19643c4955e35440676ef043d8f47818e2d375ccb25793a75a25226e103c0a21c6820c8058925396e03676457e2861efd94762
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202e.exe
Filesize288KB
MD53e1b81bb68aa5bc66bb04eedd5651339
SHA1a6cd2bbfeb9118a68a4ec5a0dd5a6768e869ad09
SHA25669b6a7bb4896a706f891f6aba92e6e3fe1d6b60e8bf08d5ba0f06e3272a95b8a
SHA512fecc1561120793ea21bd27658437097d4ac17a7cc966a2b22a2377ab23491fd25162550668ceff31383365a87f2a663b6cd06c442ad733a1944b19f08486cd66
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202f.exe
Filesize288KB
MD5dd28e75d1358be5c48b8506aee097010
SHA1d1351763ab0825a5f31b8a32515493cf18a0a9b3
SHA256b282430a5c7d9e8583e4ca24bbdbbb9b5cc3bad8fb861a23d1ac47e04d67e0aa
SHA5122c719a1c8b0553edfdb113e48f93f93ad2ddf77d7471a969eb37b0ef21afd488fa479c6262a310a21fcba184faa6ed7caaa50eda943aa349046e76393a152ad4
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202g.exe
Filesize288KB
MD559ccc325afcfc3da12a3d4d0dcb81214
SHA1ca28f2d8e68eb8a0d6db823d1c306745ca3172b5
SHA2562d5ce337af0b848278c67cd9c8cae35df9c60d41162a68d873388354f1c25f26
SHA512ca5d1fa9725496272617b05fa50286a77fc93e946bdc0aabe88ddd8394d06d07818047d6b375a94794c890b61698e39143d761c7dad4e7f6cf9312d7c28a2741
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202h.exe
Filesize288KB
MD5afcdeffb08fb5f5b848944a9d6e0fdc6
SHA1a1db5d640651cc103cd9deb395c285fa82a423d9
SHA2564918314b1b768688562fdf24eeb84a02ac5074d4abfdd60582352995464a4a45
SHA512a25faba8767be16de97841a08aa1f3de1e52115862401091eed040ab86ea4760927643c44b5039c46a99def143b4c4f32a2f9e238a3418eba64eb58309255eaf
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202k.exe
Filesize288KB
MD5c0b6c27812f3166d58567699eab8de15
SHA108de15cf7945d9948e1fa81f723dedfe3e13a0c7
SHA256378ea27953b5e2376eed4820a8036ef2005b0ec94aabb40f08b11239a8c0e9d6
SHA512ac0f6473e4b9ac1bf68682bc270137bd6186da9052044f0c33576a4944aff73c21ad1e227e2c7001171c19021b3b08363571b5634ef4817a2cba03c63d5dbb6e
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe
Filesize64KB
MD5010c2efb03806b9321f17ee1e1c2466e
SHA17e09f64889f84897163ff1018c6cfa73298f111c
SHA256047f62b3d9e41e685eec6202c78af34059124fb3918f98dc2058f0d6dea7afa1
SHA512e3716f8a604f8899d1a42242352edcda8ae74de4152ad23d32ca234c3f3d76d8a769e34feb725c9816ac6dad499d0dc2a812caa4641779fce72c78c730916122
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202m.exe
Filesize288KB
MD55327dcfc88991d438a3b7682b3c69b39
SHA1a1170f04ab51e0bad3f88cfdb2d1d3c79ce83eeb
SHA2568666bc2b237929856fc9df254f27379ab9c584cc9be0d9fe70d4d1b77fd9fb59
SHA5129f3573715dba905ff2deb676d5d1c097efba13052f94c65edf7854b3caedc283f724e62da0ee1c8303563b0873f6ae577892937adba1e198bd7638a353e382f2
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202n.exe
Filesize288KB
MD5e6127afc42cc7d21c3ec681c1faca7ee
SHA135231ffb797bd15e5e269c58a6062dd8da5c255f
SHA2564a7c13c890876adb14d64870d8a56e07f90b0d13410f196a6843413404aed5a3
SHA5128dbdba6711b783033f085b6e7c561fa233f99569ecc237d635e1b8f8e2b2207282aa645ae52a39b3f8e12b48fddaa141aa989ae56c87671d9e69745ca7ae2ec1
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202o.exe
Filesize288KB
MD5ec3ec82c115542c93b0625d609ef7095
SHA18c7ebad0b0beafdc0f6fc90d605e86f9296099f6
SHA256bbc5c2df53f3f4b8beb3f7b8f0db48b090a652ab20313be709689f05c0c89ed9
SHA5120a8e54878cc5793437b866c777d53c500260c65f5f88fffe16194688dfd454bd0afdfdd102286842b0ef3928c4b7bd55f6970e3f38f11261adf890ef5a796f34
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202s.exe
Filesize288KB
MD502109bb3311e5d3a99888487117da5f9
SHA1410eb9a1c37558a849a6c062b72e4d7553ffcfbf
SHA256eb0d813a161e88b6ebda5a731d369f80ce8c675743c69981ab0a21aedb563069
SHA512164897f5a9a9f48ebbcc05401db1073718daadfe21dfbe4880d90d0ae475fbed2f1d5a1b44a3139d4b94dfc4196b54f1f90b1149d379499ae09137b4350ed1a5
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202t.exe
Filesize288KB
MD5de8129c64a9594c2b2c366ccec4cf98c
SHA14d72c16eb2bdf4b35d7c84bf71f3fedd061e5458
SHA256e2e7f0a455be792af55c51bec26f8c19fc7f14883105a31cf1035a13e0ee47f5
SHA5127118299743db121371bc299de4341080ea8bec2e1e7c049da790e1b4f9ac35960418a2685eda8c7298ee6c861d9ac04d8cfeeb56d9a29f8f579a5cf3715c3604
-
C:\Users\Admin\AppData\Local\Temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202u.exe
Filesize288KB
MD55c1c1d9fa32cc66d6b4bd5bd8aa9a487
SHA1ad58f8e3d248b4a1eca21a10617de587c2cb5ba3
SHA256d3881ec33c8fcccbdb10a0aa08db3f5d76cb03743fc98317ecb8712f30d265c2
SHA512324fdb1fc01741c5c6ff1800ccfb177fef1e94cb7759e7dbff0347311387e42d43768e9c4d37c731171866bf514cc0a4501e925edb08b57ee35212ea2dc3fec1
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202a.exe
Filesize288KB
MD5c83665b9f3a152088bccca248fb56e50
SHA172179b4358014a0807101eb1524fe9d2a4c927fd
SHA2568eac7c6d77bf653c35d6c57829b80e436cc637d9b750638afb4cf60f9d84084e
SHA512a5c1d175dd67d32913140dc59b0649005ec7607c1dda5dc0bb8b8450e5d8637a32e56afe99682bb618744592453f486b08e281dc28dbc5f670081aecca741a9c
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202i.exe
Filesize288KB
MD50965d76d9d8a43374eb6963e62561eff
SHA1ebac6b97a886e23983b69df93959c6bf9e2230ea
SHA2565db93ce776389f5d11ddea706841414a8314b83a8192b89bfa74767b824f09a6
SHA512119cac80264fab653fbcf7d9cf8c0d11fa9e4fc7454eaf00e369011a2a52bfb311729f9ad91f19284261e5eb5204cb41c35b1a784825a1497806798dcd45aeff
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202j.exe
Filesize288KB
MD5723fca446a1668b9f653217abd1d25b5
SHA1966bec42bef303909ac4bc16308cbd91c1421ec2
SHA256c7c897a7c224f02a9999a3ec8692105b3611698f961a4fce016bc8ace460d822
SHA512d8520726a28425d1989401483147595f2aa54a2b87107489b8b61eae8d75cdcdc799ba573995ce41f87084015518034bdc733408dcf60aebf2c864cefdd9ef1a
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202l.exe
Filesize288KB
MD524b8f595c6ba8bb2f5edeea5ea3cfd8f
SHA1688faad0de8369d993da1694d51be88272a1088d
SHA256b2c9d8ec90b40f66e030aed465e24ffd2c7502f263ed8d422a0cfa93235b7d34
SHA512f47e011dfad20f7915d761da945c5181bd2730b246115b2b08b06807ca35c58fc4b4d37b15df8162854a4dd07800e4686cde2536903f9734237b404f44afb515
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202p.exe
Filesize288KB
MD5d2033441742d558a32cd42e776da5ba1
SHA13bd4f9a930b51cec97c09e2e7d79a3e5b0993769
SHA256abe4d832b604e3f95667e839944db06e0c97c56ad679ba569d0403a7cd00329d
SHA5128c1b760ad8fb4518e509091e3ce1e164e5c9f70508e9c5442d74727d67b12cd24f293b0fa2466b6dd4204f2f5f6365cbc92376f21a5e0969a18266a57225d53b
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202q.exe
Filesize288KB
MD5678e0b79625b27e9888088405df5c160
SHA1f0d8ac692d8db20501b580a0d382c5aebbe20fb7
SHA256c44161499eedaf0515d56eb600a42bca0dc2869b714bbe2a80a434e7a29bf822
SHA5129245d8bb0c8a57e6f3bdbb25338506b7abfd483cf5cdc3479143278b910ab96bc6baa99f817ea1cd6d512895e1a0932370523163117369e09fe9be9b526d4217
-
\??\c:\users\admin\appdata\local\temp\a4b7fb640253099f0bbdedf7a7f118b28274175849b792c7ef69f596623e6595_3202r.exe
Filesize288KB
MD56c54327162c1da76280579e4a24942b3
SHA114ac1c103341b67e50af6f430919e3fce749d595
SHA256d457fad75b7d6f8fa1229bfd15140f4e8d2f4253e56b36e33cbb60530c212763
SHA51243995eab7b6da1aaee7786417756fa49d5dd40354d8cba7bf2505ca04675198df27d347b1857b74c56bb1bc92cdb3ca8f675403dec78d5d4435432a02a7d0109