Overview
overview
10Static
static
7dashboard ...rd.exe
windows7-x64
10dashboard ...rd.exe
windows10-2004-x64
10open for m...fo.exe
windows7-x64
3open for m...fo.exe
windows10-2004-x64
password g...er.exe
windows7-x64
10password g...er.exe
windows10-2004-x64
10stealer to...rd.exe
windows7-x64
3stealer to...rd.exe
windows10-2004-x64
3stealer to...on.exe
windows7-x64
10stealer to...on.exe
windows10-2004-x64
Analysis
-
max time kernel
1792s -
max time network
1166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 17:26
Behavioral task
behavioral1
Sample
dashboard for all stealers (recomended for start)/paid dashboard.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dashboard for all stealers (recomended for start)/paid dashboard.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
open for more info/more info.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
open for more info/more info.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
password grabber recommended/password stealer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
password grabber recommended/password stealer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
stealer tool (most recomended)/stealer tool dashboard.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
stealer tool (most recomended)/stealer tool dashboard.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
stealer tool + secret options/ADM Adrenaline Ultimate Edition.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
stealer tool + secret options/ADM Adrenaline Ultimate Edition.exe
Resource
win10v2004-20240802-en
General
-
Target
dashboard for all stealers (recomended for start)/paid dashboard.exe
-
Size
2.5MB
-
MD5
660e26001a8891e78135a09d3ec2623f
-
SHA1
bd95c1955be08eaecefa7b3dd1cbdac7387b6d06
-
SHA256
1811c7b5ddcc6637a782bf32db70b60bd0bf3ec2b3498716591f718cda25fd14
-
SHA512
590df723aaa52806f664adec89bf6e8e570a9c88b4858131fb59f23e31ab3302189393bceb58fe1aa71475065aefab2d093d5f8ad6296693d4124e5a10a34e92
-
SSDEEP
49152:cCEz1VWQraflEcY8GSFJ2CBUm5htDRvG0JuH0Xv6GVO8UKlo:cn14QilESfFim15rtxUuo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation paid dashboard.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 5000 bg.exe 2404 YSkullLock.exe -
resource yara_rule behavioral2/memory/1032-0-0x0000000000400000-0x0000000000DD9000-memory.dmp upx behavioral2/memory/1032-40-0x0000000000400000-0x0000000000DD9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YellowSkull2 Special Program = "C:\\YSkullMBRSetup.exe" reg.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\Wallpaper = "c:\\yellowskull.bmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paid dashboard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YSkullLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Kills process with taskkill 1 IoCs
pid Process 4084 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings\MuiCache SearchApp.exe -
Modifies registry key 1 TTPs 7 IoCs
pid Process 220 reg.exe 4676 reg.exe 2476 reg.exe 2252 reg.exe 1348 reg.exe 3100 reg.exe 3352 reg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4084 taskkill.exe Token: 33 4336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4336 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 YSkullLock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2324 1032 paid dashboard.exe 85 PID 1032 wrote to memory of 2324 1032 paid dashboard.exe 85 PID 1032 wrote to memory of 2324 1032 paid dashboard.exe 85 PID 2324 wrote to memory of 1000 2324 cmd.exe 88 PID 2324 wrote to memory of 1000 2324 cmd.exe 88 PID 2324 wrote to memory of 1000 2324 cmd.exe 88 PID 2324 wrote to memory of 4684 2324 cmd.exe 89 PID 2324 wrote to memory of 4684 2324 cmd.exe 89 PID 2324 wrote to memory of 4684 2324 cmd.exe 89 PID 2324 wrote to memory of 4144 2324 cmd.exe 90 PID 2324 wrote to memory of 4144 2324 cmd.exe 90 PID 2324 wrote to memory of 4144 2324 cmd.exe 90 PID 2324 wrote to memory of 956 2324 cmd.exe 91 PID 2324 wrote to memory of 956 2324 cmd.exe 91 PID 2324 wrote to memory of 956 2324 cmd.exe 91 PID 2324 wrote to memory of 4020 2324 cmd.exe 92 PID 2324 wrote to memory of 4020 2324 cmd.exe 92 PID 2324 wrote to memory of 4020 2324 cmd.exe 92 PID 2324 wrote to memory of 3624 2324 cmd.exe 93 PID 2324 wrote to memory of 3624 2324 cmd.exe 93 PID 2324 wrote to memory of 3624 2324 cmd.exe 93 PID 2324 wrote to memory of 4544 2324 cmd.exe 94 PID 2324 wrote to memory of 4544 2324 cmd.exe 94 PID 2324 wrote to memory of 4544 2324 cmd.exe 94 PID 2324 wrote to memory of 1180 2324 cmd.exe 95 PID 2324 wrote to memory of 1180 2324 cmd.exe 95 PID 2324 wrote to memory of 1180 2324 cmd.exe 95 PID 2324 wrote to memory of 5068 2324 cmd.exe 96 PID 2324 wrote to memory of 5068 2324 cmd.exe 96 PID 2324 wrote to memory of 5068 2324 cmd.exe 96 PID 2324 wrote to memory of 4192 2324 cmd.exe 97 PID 2324 wrote to memory of 4192 2324 cmd.exe 97 PID 2324 wrote to memory of 4192 2324 cmd.exe 97 PID 2324 wrote to memory of 3892 2324 cmd.exe 98 PID 2324 wrote to memory of 3892 2324 cmd.exe 98 PID 2324 wrote to memory of 3892 2324 cmd.exe 98 PID 2324 wrote to memory of 4524 2324 cmd.exe 99 PID 2324 wrote to memory of 4524 2324 cmd.exe 99 PID 2324 wrote to memory of 4524 2324 cmd.exe 99 PID 2324 wrote to memory of 2532 2324 cmd.exe 100 PID 2324 wrote to memory of 2532 2324 cmd.exe 100 PID 2324 wrote to memory of 2532 2324 cmd.exe 100 PID 2324 wrote to memory of 4584 2324 cmd.exe 101 PID 2324 wrote to memory of 4584 2324 cmd.exe 101 PID 2324 wrote to memory of 4584 2324 cmd.exe 101 PID 2324 wrote to memory of 3908 2324 cmd.exe 102 PID 2324 wrote to memory of 3908 2324 cmd.exe 102 PID 2324 wrote to memory of 3908 2324 cmd.exe 102 PID 2324 wrote to memory of 5072 2324 cmd.exe 103 PID 2324 wrote to memory of 5072 2324 cmd.exe 103 PID 2324 wrote to memory of 5072 2324 cmd.exe 103 PID 2324 wrote to memory of 4320 2324 cmd.exe 104 PID 2324 wrote to memory of 4320 2324 cmd.exe 104 PID 2324 wrote to memory of 4320 2324 cmd.exe 104 PID 2324 wrote to memory of 2364 2324 cmd.exe 105 PID 2324 wrote to memory of 2364 2324 cmd.exe 105 PID 2324 wrote to memory of 2364 2324 cmd.exe 105 PID 2324 wrote to memory of 2168 2324 cmd.exe 106 PID 2324 wrote to memory of 2168 2324 cmd.exe 106 PID 2324 wrote to memory of 2168 2324 cmd.exe 106 PID 2324 wrote to memory of 4264 2324 cmd.exe 107 PID 2324 wrote to memory of 4264 2324 cmd.exe 107 PID 2324 wrote to memory of 4264 2324 cmd.exe 107 PID 2324 wrote to memory of 4180 2324 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dashboard for all stealers (recomended for start)\paid dashboard.exe"C:\Users\Admin\AppData\Local\Temp\dashboard for all stealers (recomended for start)\paid dashboard.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7639.tmp\YellowSkull2.bat" "2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\yellowskull.bmp /f3⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:956
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4020
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4676
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2252
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1348
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\7639.tmp\bg.exebg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\7639.tmp\YSkullLock.exeYSkullLock.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "YellowSkull2 Special Program" /t REG_SZ /F /D "C:\YSkullMBRSetup.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7639.tmp\k.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
PID:5032
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133682177986058573.txt
Filesize75KB
MD5263960904fcb1c46cc216bd860eb0240
SHA157b1f6a4dceb07eebc008d41f4b21c3aa1d554e4
SHA256bf9f2ea1d49864a9c1dfe096dbcfd1e1f262e6223615bf8cc4ec786f19b37c28
SHA5125b52d8b705cc043a7802d918500601e05f1e676752864daecdb7515ba2603e8840d2bb384a710fd85803a5cb72c80cc1e9655407627bd9e6715f905215f1ca8f
-
Filesize
2.9MB
MD52191c3a14b53531e82726b17dd331cef
SHA19fdcc1ef73bbd08ac8f4cb3bdaf4c4ed26a99737
SHA2563b2abd3773e4678100f197f53a886ec833fd2e26aa9a94d780a2d22befdf7d44
SHA51293dc75ae619bcac6566c6e773c3628c2ef1326d988e592e59a1c8f9be304014a970caf40bf255a52b26fb37ca1d2625c8bf95b5dc749f378a0450a74aa3421f9
-
Filesize
1.3MB
MD5220303eb72ebde4605116640fb719b26
SHA12021794facb35a7a23796e74835d8cf93882ddaf
SHA256f081c913488c3f22b62f906dac2a82a38d085ebe1d28701f0059dfdfbf1ccf42
SHA512dc811be33365049b32c3a47de9b4f4e4f77be0a9dfd14bfcfce92a6f575cf9bbd4aa56fcc92a3d8bf7bd21354f6530f3cc50a1f185a5953861d3a73a3f1738fc
-
Filesize
2.9MB
MD511bcda64d254ad8dc591b41f8fceb04d
SHA166d9dea8a7c3d0bb6e9924a4c86f5eef98317752
SHA25684c5dad2d4cec5b636c1fae6f1e1482ada9f62363dcf269b4a86f6070d5b50fc
SHA512b26287ed0de799b95a4bb1f18eb92e3a24dc8250eb09c669112d4b60e7e362012c564d0959ddfe128bc00a63601d9132160cc93276cb72ebc0e0ab2fc2d837b2
-
Filesize
3KB
MD54671d5895d88bc19645cab0fc7ca398a
SHA1d6b1ccef99793b0dcd09156a6460027271cde082
SHA256dd8aa9f7955674a7a1b5b222d7c1809c583c705dae8bf476cdd42efcc0afabb5
SHA512ea21a82ccbb1647bdd45890dadb1740a8dbb7d4cd7481a252545a6db2ce7fda1ce7c808b102bbd4dbd8764a6f824d6529044002f234bb5c255504f6b85ab926b
-
Filesize
102KB
MD512cf508e9058e3e67cf8a736557c2749
SHA18448240c260ccef2d23854e749387b65e4b6668e
SHA256b3670ec42931e2dea3e03053eda32240d8b6db15bf89d0c74e23e99ecb0aaf49
SHA5127a837b5a89f29974b1e305e2082d5f7aee46bee3cef7e8a8b47a877d5bd6280c359318d6002c2c283aed13054a8ee590778e99e423a25f84f3037b0249c6403a
-
Filesize
2.6MB
MD5832b350b50a07906c630a2b8819fd209
SHA1362d4d61df27a40f975e26b3d8ace1e8fac10f94
SHA25694e1cecf8ed740ea45c87927de31005c3b2f9db261aae04fe56a81e337d1e8da
SHA512cf267295d0248029e4a92d1052df1e24c93d3be79adb1efa9723c64e9c7bb52108a3bc194e772ff0e6dcb5b2208e9d7787a81a86e74ee11892571760e40abcbf
-
Filesize
140B
MD5126595a4087b9e1b9bac69aab147c97f
SHA1ef079808ab8f7b762c413c5fa5844f4285f2848c
SHA2564c59cedcafe3f5a1025960b344107f7e18c98ca569d2e6c8aa3d685b20754089
SHA51241cc1badee06c16a0c65cbf7f38a420ca3c8e0ea459afd208b9b01cbeeef6724b8f2c04ecb41bec9d045492f9be0361612204db77eae7e1aeece8fe3761a7eb4