Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 01:48
Static task
static1
1 signatures
15 signatures
150 seconds
12 signatures
150 seconds
General
-
Target
-
Size
220KB
-
MD5
3ed3fb296a477156bc51aba43d825fc0
-
SHA1
9caa5c658b1a88fee149893d3a00b34a8bb8a1a6
-
SHA256
1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
-
SHA512
dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e
-
SSDEEP
3072:EJv/3Ppzq+M4Lh5VWK5qlYRV+hvuFiweXXbGgL90v5mq33Z3:8hzEA5GlYMWFBeXvx0c+3
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\Geo\Nation kkUUQMYc.exe -
Deletes itself 1 IoCs
pid Process 2088 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2016 kkUUQMYc.exe 1720 qQsQYggA.exe -
Loads dropped DLL 20 IoCs
pid Process 1176 [email protected] 1176 [email protected] 1176 [email protected] 1176 [email protected] 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\kkUUQMYc.exe = "C:\\Users\\Admin\\ViUIMQQA\\kkUUQMYc.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qQsQYggA.exe = "C:\\ProgramData\\FAAocEsU\\qQsQYggA.exe" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\kkUUQMYc.exe = "C:\\Users\\Admin\\ViUIMQQA\\kkUUQMYc.exe" kkUUQMYc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qQsQYggA.exe = "C:\\ProgramData\\FAAocEsU\\qQsQYggA.exe" qQsQYggA.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico kkUUQMYc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2504 reg.exe 780 reg.exe 1688 reg.exe 1996 reg.exe 112 reg.exe 2952 reg.exe 2292 reg.exe 2320 reg.exe 2812 reg.exe 852 reg.exe 2404 reg.exe 2668 reg.exe 1952 reg.exe 1096 reg.exe 1672 reg.exe 2516 reg.exe 2732 reg.exe 1404 reg.exe 1724 reg.exe 2220 reg.exe 2328 reg.exe 2344 reg.exe 2540 reg.exe 2244 reg.exe 2528 reg.exe 2148 reg.exe 2472 reg.exe 1764 reg.exe 2008 reg.exe 1124 reg.exe 1676 reg.exe 1784 reg.exe 1824 reg.exe 2308 reg.exe 880 reg.exe 2028 reg.exe 2568 reg.exe 1872 reg.exe 1052 reg.exe 772 reg.exe 3016 reg.exe 240 reg.exe 2740 reg.exe 1548 reg.exe 2192 reg.exe 2408 reg.exe 1576 reg.exe 1608 reg.exe 2332 reg.exe 2208 reg.exe 2360 reg.exe 2104 reg.exe 2052 reg.exe 1940 reg.exe 1072 reg.exe 2052 reg.exe 1500 reg.exe 2544 reg.exe 968 reg.exe 2928 reg.exe 1756 reg.exe 2456 reg.exe 3024 reg.exe 856 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 kkUUQMYc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe 2016 kkUUQMYc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2016 1176 [email protected] 28 PID 1176 wrote to memory of 2016 1176 [email protected] 28 PID 1176 wrote to memory of 2016 1176 [email protected] 28 PID 1176 wrote to memory of 2016 1176 [email protected] 28 PID 1176 wrote to memory of 1720 1176 [email protected] 29 PID 1176 wrote to memory of 1720 1176 [email protected] 29 PID 1176 wrote to memory of 1720 1176 [email protected] 29 PID 1176 wrote to memory of 1720 1176 [email protected] 29 PID 1176 wrote to memory of 2584 1176 [email protected] 483 PID 1176 wrote to memory of 2584 1176 [email protected] 483 PID 1176 wrote to memory of 2584 1176 [email protected] 483 PID 1176 wrote to memory of 2584 1176 [email protected] 483 PID 2584 wrote to memory of 2472 2584 cmd.exe 1005 PID 2584 wrote to memory of 2472 2584 cmd.exe 1005 PID 2584 wrote to memory of 2472 2584 cmd.exe 1005 PID 2584 wrote to memory of 2472 2584 cmd.exe 1005 PID 1176 wrote to memory of 2264 1176 [email protected] 33 PID 1176 wrote to memory of 2264 1176 [email protected] 33 PID 1176 wrote to memory of 2264 1176 [email protected] 33 PID 1176 wrote to memory of 2264 1176 [email protected] 33 PID 1176 wrote to memory of 2652 1176 [email protected] 803 PID 1176 wrote to memory of 2652 1176 [email protected] 803 PID 1176 wrote to memory of 2652 1176 [email protected] 803 PID 1176 wrote to memory of 2652 1176 [email protected] 803 PID 1176 wrote to memory of 2668 1176 [email protected] 36 PID 1176 wrote to memory of 2668 1176 [email protected] 36 PID 1176 wrote to memory of 2668 1176 [email protected] 36 PID 1176 wrote to memory of 2668 1176 [email protected] 36 PID 1176 wrote to memory of 2408 1176 [email protected] 39 PID 1176 wrote to memory of 2408 1176 [email protected] 39 PID 1176 wrote to memory of 2408 1176 [email protected] 39 PID 1176 wrote to memory of 2408 1176 [email protected] 39 PID 2472 wrote to memory of 1048 2472 [email protected] 499 PID 2472 wrote to memory of 1048 2472 [email protected] 499 PID 2472 wrote to memory of 1048 2472 [email protected] 499 PID 2472 wrote to memory of 1048 2472 [email protected] 499 PID 2408 wrote to memory of 2792 2408 cmd.exe 41 PID 2408 wrote to memory of 2792 2408 cmd.exe 41 PID 2408 wrote to memory of 2792 2408 cmd.exe 41 PID 2408 wrote to memory of 2792 2408 cmd.exe 41 PID 1048 wrote to memory of 1496 1048 cmd.exe 1035 PID 1048 wrote to memory of 1496 1048 cmd.exe 1035 PID 1048 wrote to memory of 1496 1048 cmd.exe 1035 PID 1048 wrote to memory of 1496 1048 cmd.exe 1035 PID 2472 wrote to memory of 1780 2472 [email protected] 45 PID 2472 wrote to memory of 1780 2472 [email protected] 45 PID 2472 wrote to memory of 1780 2472 [email protected] 45 PID 2472 wrote to memory of 1780 2472 [email protected] 45 PID 2472 wrote to memory of 1060 2472 [email protected] 46 PID 2472 wrote to memory of 1060 2472 [email protected] 46 PID 2472 wrote to memory of 1060 2472 [email protected] 46 PID 2472 wrote to memory of 1060 2472 [email protected] 46 PID 2472 wrote to memory of 1820 2472 [email protected] 193 PID 2472 wrote to memory of 1820 2472 [email protected] 193 PID 2472 wrote to memory of 1820 2472 [email protected] 193 PID 2472 wrote to memory of 1820 2472 [email protected] 193 PID 2472 wrote to memory of 2640 2472 [email protected] 833 PID 2472 wrote to memory of 2640 2472 [email protected] 833 PID 2472 wrote to memory of 2640 2472 [email protected] 833 PID 2472 wrote to memory of 2640 2472 [email protected] 833 PID 1496 wrote to memory of 1968 1496 [email protected] 212 PID 1496 wrote to memory of 1968 1496 [email protected] 212 PID 1496 wrote to memory of 1968 1496 [email protected] 212 PID 1496 wrote to memory of 1968 1496 [email protected] 212
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\ViUIMQQA\kkUUQMYc.exe"C:\Users\Admin\ViUIMQQA\kkUUQMYc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2016
-
-
C:\ProgramData\FAAocEsU\qQsQYggA.exe"C:\ProgramData\FAAocEsU\qQsQYggA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"4⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"6⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"8⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"10⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"12⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"14⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"16⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom17⤵
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"18⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"20⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"22⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"24⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"26⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"28⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"30⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"32⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"34⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"36⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"38⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"40⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"42⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom43⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"44⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"46⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"48⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"50⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"52⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"54⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"56⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"58⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"60⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"62⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"64⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom65⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"66⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom67⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"68⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom69⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"70⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom71⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"72⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom73⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"74⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom75⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"76⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom77⤵PID:1352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"78⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom79⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"80⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom81⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"82⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom83⤵PID:276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"84⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom85⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"86⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom87⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"88⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom89⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"90⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom91⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"92⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom93⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"94⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom95⤵PID:2108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"96⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom97⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"98⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom99⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"100⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom101⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"102⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom103⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"104⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom105⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"106⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom107⤵PID:2980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"108⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom109⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"110⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom111⤵PID:2480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"112⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom113⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"114⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom115⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"116⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom117⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"118⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom119⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"120⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom121⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Endermanch@PolyRansom"122⤵PID:1704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-