Analysis
-
max time kernel
88s -
max time network
78s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/08/2024, 11:51
Behavioral task
behavioral1
Sample
IDM Trial Reset.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win11-20240802-en
General
-
Target
IDM Trial Reset.exe
-
Size
874KB
-
MD5
064f82094ae6a6e22c28a6f1ef868a26
-
SHA1
e034cf1fa855eef53fd46a5ec213ada99e2ece19
-
SHA256
a2d2b22cd0d5628976eb5996a8b20f3b5ac468907910dbc3f826f1069d435587
-
SHA512
7fced0980ada793abe81337911d00d6e351ba1e9ce7c6193c9f4af29c1cf210f18240071d33edb237d752dbb7732de205c1d49530ae7bf8aecd2b3147edd3afe
-
SSDEEP
12288:fozGdX0M4ornOmZIzfMwHHQmRROXKFHhFjvVAcJlbqm9is3MjNindDO4FVALS/Bt:f4GHnhIzOarrVuy8jadVFZIV7Um5iJ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2472 SetACLx64.exe 2080 SetACLx64.exe 1692 SetACLx64.exe 4340 SetACLx64.exe 876 SetACLx64.exe 2464 SetACLx64.exe 576 SetACLx64.exe 3520 SetACLx64.exe 1556 SetACLx64.exe 1732 SetACLx64.exe 1476 SetACLx64.exe 1488 SetACLx64.exe 3632 SetACLx64.exe 996 SetACLx64.exe 1344 SetACLx64.exe 4376 SetACLx64.exe 240 SetACLx64.exe 1116 SetACLx64.exe 1028 SetACLx64.exe 4764 SetACLx64.exe 1804 SetACLx64.exe 4060 SetACLx64.exe 4984 SetACLx64.exe 816 SetACLx64.exe 5020 SetACLx64.exe 4856 SetACLx64.exe 660 SetACLx64.exe 672 SetACLx64.exe 1780 SetACLx64.exe 4748 SetACLx64.exe 2516 SetACLx64.exe 4692 SetACLx64.exe 1464 SetACLx64.exe 5044 SetACLx64.exe 1488 SetACLx64.exe 3632 SetACLx64.exe 5112 SetACLx64.exe 4392 SetACLx64.exe 2692 SetACLx64.exe 4852 SetACLx64.exe 668 SetACLx64.exe 3844 SetACLx64.exe 2472 SetACLx64.exe 3768 SetACLx64.exe 2068 SetACLx64.exe 3360 SetACLx64.exe 3924 SetACLx64.exe 4340 SetACLx64.exe 588 SetACLx64.exe 4916 SetACLx64.exe 920 SetACLx64.exe 4728 SetACLx64.exe 2724 SetACLx64.exe 1732 SetACLx64.exe 3596 SetACLx64.exe 1040 SetACLx64.exe 4152 SetACLx64.exe 4776 SetACLx64.exe 3632 SetACLx64.exe 3256 SetACLx64.exe 4948 SetACLx64.exe 3424 SetACLx64.exe 4080 SetACLx64.exe 2124 SetACLx64.exe -
resource yara_rule behavioral1/memory/3532-0-0x0000000000A60000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3532-26-0x0000000000A60000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3532-27-0x0000000000A60000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3532-33-0x0000000000A60000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3532-105-0x0000000000A60000-0x0000000000C42000-memory.dmp upx behavioral1/memory/3532-174-0x0000000000A60000-0x0000000000C42000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Windows\CurrentVersion\Run\IDM trial reset = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IDM Trial Reset.exe\" /trial" reg.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3532-26-0x0000000000A60000-0x0000000000C42000-memory.dmp autoit_exe behavioral1/memory/3532-27-0x0000000000A60000-0x0000000000C42000-memory.dmp autoit_exe behavioral1/memory/3532-33-0x0000000000A60000-0x0000000000C42000-memory.dmp autoit_exe behavioral1/memory/3532-105-0x0000000000A60000-0x0000000000C42000-memory.dmp autoit_exe behavioral1/memory/3532-174-0x0000000000A60000-0x0000000000C42000-memory.dmp autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDM Trial Reset.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} SetACLx64.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID SetACLx64.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\WOW6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} reg.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} reg.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}\scansk = "0" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} reg.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Wow6432Node\CLSID SetACLx64.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} SetACLx64.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\WOW6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}\scansk = "0" reg.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} SetACLx64.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} SetACLx64.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2452 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3600 vlc.exe 3488 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3532 IDM Trial Reset.exe 3600 vlc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2472 SetACLx64.exe Token: SeRestorePrivilege 2472 SetACLx64.exe Token: SeTakeOwnershipPrivilege 2472 SetACLx64.exe Token: SeBackupPrivilege 2080 SetACLx64.exe Token: SeRestorePrivilege 2080 SetACLx64.exe Token: SeTakeOwnershipPrivilege 2080 SetACLx64.exe Token: SeBackupPrivilege 1692 SetACLx64.exe Token: SeRestorePrivilege 1692 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1692 SetACLx64.exe Token: SeBackupPrivilege 4340 SetACLx64.exe Token: SeRestorePrivilege 4340 SetACLx64.exe Token: SeTakeOwnershipPrivilege 4340 SetACLx64.exe Token: SeBackupPrivilege 876 SetACLx64.exe Token: SeRestorePrivilege 876 SetACLx64.exe Token: SeTakeOwnershipPrivilege 876 SetACLx64.exe Token: SeBackupPrivilege 2464 SetACLx64.exe Token: SeRestorePrivilege 2464 SetACLx64.exe Token: SeTakeOwnershipPrivilege 2464 SetACLx64.exe Token: SeBackupPrivilege 576 SetACLx64.exe Token: SeRestorePrivilege 576 SetACLx64.exe Token: SeTakeOwnershipPrivilege 576 SetACLx64.exe Token: SeBackupPrivilege 3520 SetACLx64.exe Token: SeRestorePrivilege 3520 SetACLx64.exe Token: SeTakeOwnershipPrivilege 3520 SetACLx64.exe Token: SeBackupPrivilege 1556 SetACLx64.exe Token: SeRestorePrivilege 1556 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1556 SetACLx64.exe Token: SeBackupPrivilege 1732 SetACLx64.exe Token: SeRestorePrivilege 1732 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1732 SetACLx64.exe Token: SeBackupPrivilege 1476 SetACLx64.exe Token: SeRestorePrivilege 1476 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1476 SetACLx64.exe Token: SeBackupPrivilege 1488 SetACLx64.exe Token: SeRestorePrivilege 1488 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1488 SetACLx64.exe Token: SeBackupPrivilege 3632 SetACLx64.exe Token: SeRestorePrivilege 3632 SetACLx64.exe Token: SeTakeOwnershipPrivilege 3632 SetACLx64.exe Token: SeBackupPrivilege 996 SetACLx64.exe Token: SeRestorePrivilege 996 SetACLx64.exe Token: SeTakeOwnershipPrivilege 996 SetACLx64.exe Token: SeBackupPrivilege 1344 SetACLx64.exe Token: SeRestorePrivilege 1344 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1344 SetACLx64.exe Token: SeBackupPrivilege 4376 SetACLx64.exe Token: SeRestorePrivilege 4376 SetACLx64.exe Token: SeTakeOwnershipPrivilege 4376 SetACLx64.exe Token: SeBackupPrivilege 240 SetACLx64.exe Token: SeRestorePrivilege 240 SetACLx64.exe Token: SeTakeOwnershipPrivilege 240 SetACLx64.exe Token: SeBackupPrivilege 1116 SetACLx64.exe Token: SeRestorePrivilege 1116 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1116 SetACLx64.exe Token: SeBackupPrivilege 1028 SetACLx64.exe Token: SeRestorePrivilege 1028 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1028 SetACLx64.exe Token: SeBackupPrivilege 4764 SetACLx64.exe Token: SeRestorePrivilege 4764 SetACLx64.exe Token: SeTakeOwnershipPrivilege 4764 SetACLx64.exe Token: SeBackupPrivilege 1804 SetACLx64.exe Token: SeRestorePrivilege 1804 SetACLx64.exe Token: SeTakeOwnershipPrivilege 1804 SetACLx64.exe Token: SeSecurityPrivilege 1804 SetACLx64.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3488 vlc.exe 3488 vlc.exe 3488 vlc.exe 3488 vlc.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3600 vlc.exe 3488 vlc.exe 3488 vlc.exe 3488 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3600 vlc.exe 3488 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2684 3532 IDM Trial Reset.exe 84 PID 3532 wrote to memory of 2684 3532 IDM Trial Reset.exe 84 PID 3532 wrote to memory of 2684 3532 IDM Trial Reset.exe 84 PID 2684 wrote to memory of 3060 2684 cmd.exe 86 PID 2684 wrote to memory of 3060 2684 cmd.exe 86 PID 2684 wrote to memory of 3060 2684 cmd.exe 86 PID 3532 wrote to memory of 1784 3532 IDM Trial Reset.exe 234 PID 3532 wrote to memory of 1784 3532 IDM Trial Reset.exe 234 PID 3532 wrote to memory of 1784 3532 IDM Trial Reset.exe 234 PID 1784 wrote to memory of 2256 1784 cmd.exe 97 PID 1784 wrote to memory of 2256 1784 cmd.exe 97 PID 1784 wrote to memory of 2256 1784 cmd.exe 97 PID 3532 wrote to memory of 236 3532 IDM Trial Reset.exe 98 PID 3532 wrote to memory of 236 3532 IDM Trial Reset.exe 98 PID 3532 wrote to memory of 236 3532 IDM Trial Reset.exe 98 PID 236 wrote to memory of 4108 236 cmd.exe 100 PID 236 wrote to memory of 4108 236 cmd.exe 100 PID 236 wrote to memory of 4108 236 cmd.exe 100 PID 236 wrote to memory of 3044 236 cmd.exe 101 PID 236 wrote to memory of 3044 236 cmd.exe 101 PID 236 wrote to memory of 3044 236 cmd.exe 101 PID 3532 wrote to memory of 2472 3532 IDM Trial Reset.exe 191 PID 3532 wrote to memory of 2472 3532 IDM Trial Reset.exe 191 PID 3532 wrote to memory of 2080 3532 IDM Trial Reset.exe 104 PID 3532 wrote to memory of 2080 3532 IDM Trial Reset.exe 104 PID 3532 wrote to memory of 1692 3532 IDM Trial Reset.exe 106 PID 3532 wrote to memory of 1692 3532 IDM Trial Reset.exe 106 PID 3532 wrote to memory of 4340 3532 IDM Trial Reset.exe 201 PID 3532 wrote to memory of 4340 3532 IDM Trial Reset.exe 201 PID 3532 wrote to memory of 876 3532 IDM Trial Reset.exe 254 PID 3532 wrote to memory of 876 3532 IDM Trial Reset.exe 254 PID 3532 wrote to memory of 2464 3532 IDM Trial Reset.exe 204 PID 3532 wrote to memory of 2464 3532 IDM Trial Reset.exe 204 PID 3532 wrote to memory of 576 3532 IDM Trial Reset.exe 255 PID 3532 wrote to memory of 576 3532 IDM Trial Reset.exe 255 PID 3532 wrote to memory of 3520 3532 IDM Trial Reset.exe 116 PID 3532 wrote to memory of 3520 3532 IDM Trial Reset.exe 116 PID 3532 wrote to memory of 1556 3532 IDM Trial Reset.exe 118 PID 3532 wrote to memory of 1556 3532 IDM Trial Reset.exe 118 PID 3532 wrote to memory of 1732 3532 IDM Trial Reset.exe 264 PID 3532 wrote to memory of 1732 3532 IDM Trial Reset.exe 264 PID 3532 wrote to memory of 1476 3532 IDM Trial Reset.exe 122 PID 3532 wrote to memory of 1476 3532 IDM Trial Reset.exe 122 PID 3532 wrote to memory of 1488 3532 IDM Trial Reset.exe 171 PID 3532 wrote to memory of 1488 3532 IDM Trial Reset.exe 171 PID 3532 wrote to memory of 3632 3532 IDM Trial Reset.exe 223 PID 3532 wrote to memory of 3632 3532 IDM Trial Reset.exe 223 PID 3532 wrote to memory of 996 3532 IDM Trial Reset.exe 129 PID 3532 wrote to memory of 996 3532 IDM Trial Reset.exe 129 PID 3532 wrote to memory of 1344 3532 IDM Trial Reset.exe 131 PID 3532 wrote to memory of 1344 3532 IDM Trial Reset.exe 131 PID 3532 wrote to memory of 4376 3532 IDM Trial Reset.exe 133 PID 3532 wrote to memory of 4376 3532 IDM Trial Reset.exe 133 PID 3532 wrote to memory of 240 3532 IDM Trial Reset.exe 135 PID 3532 wrote to memory of 240 3532 IDM Trial Reset.exe 135 PID 3532 wrote to memory of 1116 3532 IDM Trial Reset.exe 183 PID 3532 wrote to memory of 1116 3532 IDM Trial Reset.exe 183 PID 3532 wrote to memory of 1028 3532 IDM Trial Reset.exe 139 PID 3532 wrote to memory of 1028 3532 IDM Trial Reset.exe 139 PID 3532 wrote to memory of 4764 3532 IDM Trial Reset.exe 141 PID 3532 wrote to memory of 4764 3532 IDM Trial Reset.exe 141 PID 3532 wrote to memory of 1804 3532 IDM Trial Reset.exe 239 PID 3532 wrote to memory of 1804 3532 IDM Trial Reset.exe 239 PID 3532 wrote to memory of 4060 3532 IDM Trial Reset.exe 192
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDM Trial Reset.exe"C:\Users\Admin\AppData\Local\Temp\IDM Trial Reset.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query hkcr\clsid /s > C:\Users\Admin\AppData\Local\Temp\reg_query.tmp2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\reg.exereg query hkcr\clsid /s3⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c findstr /N /I cDTvBFquXk0 C:\Users\Admin\AppData\Local\Temp\reg_query.tmp2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\findstr.exefindstr /N /I cDTvBFquXk0 C:\Users\Admin\AppData\Local\Temp\reg_query.tmp3⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c findstr /N . C:\Users\Admin\AppData\Local\Temp\reg_query.tmp | findstr /b -1:2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\findstr.exefindstr /N . C:\Users\Admin\AppData\Local\Temp\reg_query.tmp3⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\findstr.exefindstr /b -1:3⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-1-0" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4852
-
-
C:\Windows\SysWOW64\reg.exereg import "C:\Users\Admin\AppData\Local\Temp\idm_reset.reg"2⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg import "C:\Users\Admin\AppData\Local\Temp\idm_trial.reg"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
- Modifies registry class
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
- Modifies registry class
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silent2⤵
- Executes dropped EXE
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Executes dropped EXE
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Executes dropped EXE
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Executes dropped EXE
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:724
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Modifies registry class
PID:1440 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵
- Modifies registry class
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe"C:\Users\Admin\AppData\Local\Temp\SetACLx64.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-0-0" -silent2⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\DownloadManager" /v "auto_reset_trial" /t "REG_SZ" /d "2024/08/26" /f2⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IDM trial reset" /t "REG_SZ" /d "\"C:\Users\Admin\AppData\Local\Temp\IDM Trial Reset.exe\" /trial" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\GetConvertTo.ram"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3600
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RequestFind.aiff"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3488
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FormatUnregister.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
Filesize
4KB
MD517ebf21fccac9756eab46eb64ba6c029
SHA18c8eef0f220777dc9b2ddee0cad6c792d98d5487
SHA256290a3f67bbbdbd5c1101e90921475c2b95e97dc69a3141412fbac79fcadd3ee8
SHA51247eed5646fd6e232a7e1dba9678e9c787cd367cdc71a5330c5f09aef4ebff381a5eb3f5a76b4c306e45d3c6ca21fe2c749ce10bd09bb90145b46ab4299f7f4c7
-
Filesize
2KB
MD5237962e36948f3d0c9ec42efa289ac52
SHA183f7e0b993e676dd381863370d1bf80fb84aeeb5
SHA25640ad93cf424eee41a0877b11acb92f7f12d58ab3aa6fa6d64d92cfbbe11695a2
SHA512beeaeb083e6533e9410c63b7b3acf67309f3a3da80b49f18890e883f4c1d1244383dc227cd93e5a16aaaa8096f4f424d380e3aa5cc600d455b07cd4b6264e4da
-
Filesize
2.8MB
MD538ea535eb9ecc5dded7ea275e9e9584f
SHA17672527370c086559c49e08c6069b11b1492332a
SHA2566ea05889240465f1b91f7365131738643b97256280f5d5cc376c2453eab6bca7
SHA51241c5afb8248e8e4f878e7856192aac6563ef7ea4e2ea4781ce474cdd9d5ae00fae9578bd6a4993fbf27e57f48578cfc711359e6ddb9659fbd8c04f7a6f2320bb
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
78B
MD50e8ed80d632707e51e88931eac35415c
SHA138766b89fa2ff7034c25a65658943a0665ef44e1
SHA25604d76c63efde96dc448ee9cb99505feddce6cd909fecb002d7621b4ccbd054a8
SHA5127aa2259abc68f0eb984d9c9b4c069e7aeb64b512f922061b3ecd65451e6d73379c64cc83e4b8a3eada8d597451d57472d4358df43f0944ec9a2310dd8648f9b4
-
Filesize
844B
MD543d6f397b0ba905eeeafa06667428618
SHA1bc38c325de6e274affda6c6dd29815dafc8cfb63
SHA2563f33f36c06acbb9baebe77a9bb1fa166486de5be9424ef0584c97b7df7e2ab5f
SHA512c4924cc86c2f41236185c0802f6fb8e5684bd00f98d16cd1872c25a817db177fc1792d1e2668bb5fc029c79d3f60faa272936836d357aac04a8630140c7fd25a
-
Filesize
18B
MD51bd84f84b8b09b3fefed0d1c95e47972
SHA15fc279c5d7a73bf51615bf64744ca802e4072b98
SHA25640979eeff610ec8a1da10645ff66392c32e24cc3d51955c6e0eee2879cb586df
SHA5129d49052521b01c114beb08fbd4abf305ef540696444dd40dc1d744fa3fc6fa0d7ef5687694ad2677ab5d9bc9f24b09da49e4535868136efad0417ee8593013d1
-
Filesize
94KB
MD5ec3bdb41d903f7f7569e7480d02999e3
SHA157c13d86e04a69e840f22092f75e9255fc81dbdf
SHA25613f9604d1134251dbe1a950cd34cbde0ebb98c5cce8d3c81115e2fdee9f1270f
SHA51282c2922003a03c853f9426f23c364503610a35301fe56917a97c72295ef0f8c23765734d84ed8d4c3748e14d4d3a23381671717102c3d4067f3d2383f2fc0ded