Analysis
-
max time kernel
70s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
WinToolkit.exe
Resource
win10v2004-20240802-en
General
-
Target
WinToolkit.exe
-
Size
17.1MB
-
MD5
86e3765bd385c07ee8130bcc8818b0f7
-
SHA1
3132600be547a702097dbd92d852c0e2d9893086
-
SHA256
9df3185347ef7d85e2252dbb233369bd1183bf969e65413d07867cb6975509ab
-
SHA512
ebca9fc505e6357349c92e971fcc55a2e3db2fac1abe0bac22a7d296e10957f9c28cef2c76841dc8ef8bd2bf497bec144df6284cb2c8628d738b3627670ae1e0
-
SSDEEP
393216:Rn2R47DAB2HsdCjoZO/0Va7yMDudoP65kL2FA3CBcTeN4fKp0bm1QHSxsjO9Iva3:Rn2R47DAB2HsdCjoZO/0Va7yMDudoP6X
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WinToolkit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\WA.ico WinToolkit.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WinToolkit_Temp\Files\Imagex.exe WinToolkit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4241DB8A-5DAC-11EF-BFD9-7221D8032630} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wa\DefaultIcon WinToolkit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wa WinToolkit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wa\DefaultIcon\ = "C:\\Windows\\System32\\WA.ico,0" WinToolkit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1704 regedit.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1116 WinToolkit.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1116 WinToolkit.exe Token: SeRestorePrivilege 1812 reg.exe Token: SeRestorePrivilege 4164 reg.exe Token: SeRestorePrivilege 1296 reg.exe Token: SeRestorePrivilege 692 reg.exe Token: SeRestorePrivilege 1272 reg.exe Token: SeRestorePrivilege 2168 reg.exe Token: SeRestorePrivilege 4324 reg.exe Token: SeRestorePrivilege 4748 reg.exe Token: SeRestorePrivilege 1260 reg.exe Token: SeRestorePrivilege 3028 reg.exe Token: SeRestorePrivilege 4424 reg.exe Token: SeRestorePrivilege 3092 reg.exe Token: SeRestorePrivilege 4828 reg.exe Token: SeRestorePrivilege 4312 reg.exe Token: SeRestorePrivilege 2224 reg.exe Token: SeRestorePrivilege 2912 reg.exe Token: SeRestorePrivilege 4748 reg.exe Token: SeRestorePrivilege 1720 reg.exe Token: SeRestorePrivilege 2824 reg.exe Token: SeRestorePrivilege 3112 reg.exe Token: SeRestorePrivilege 516 reg.exe Token: SeRestorePrivilege 4964 reg.exe Token: SeRestorePrivilege 2776 reg.exe Token: SeRestorePrivilege 464 reg.exe Token: SeRestorePrivilege 1956 reg.exe Token: SeRestorePrivilege 1852 reg.exe Token: SeRestorePrivilege 4868 reg.exe Token: SeRestorePrivilege 2456 reg.exe Token: SeRestorePrivilege 1512 reg.exe Token: SeRestorePrivilege 3472 reg.exe Token: SeRestorePrivilege 3540 reg.exe Token: SeRestorePrivilege 4236 reg.exe Token: SeRestorePrivilege 4312 reg.exe Token: SeRestorePrivilege 1424 reg.exe Token: SeRestorePrivilege 3960 reg.exe Token: SeRestorePrivilege 1572 reg.exe Token: SeRestorePrivilege 4260 reg.exe Token: SeRestorePrivilege 3652 reg.exe Token: SeRestorePrivilege 3120 reg.exe Token: SeRestorePrivilege 3696 reg.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1116 WinToolkit.exe 1116 WinToolkit.exe 3172 iexplore.exe 1116 WinToolkit.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1116 WinToolkit.exe 1116 WinToolkit.exe 1116 WinToolkit.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3172 iexplore.exe 3172 iexplore.exe 3652 IEXPLORE.EXE 3652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1704 1116 WinToolkit.exe 88 PID 1116 wrote to memory of 1704 1116 WinToolkit.exe 88 PID 1116 wrote to memory of 3172 1116 WinToolkit.exe 99 PID 1116 wrote to memory of 3172 1116 WinToolkit.exe 99 PID 3172 wrote to memory of 3652 3172 iexplore.exe 100 PID 3172 wrote to memory of 3652 3172 iexplore.exe 100 PID 3172 wrote to memory of 3652 3172 iexplore.exe 100 PID 1116 wrote to memory of 4928 1116 WinToolkit.exe 103 PID 1116 wrote to memory of 4928 1116 WinToolkit.exe 103 PID 4928 wrote to memory of 1812 4928 cmd.exe 105 PID 4928 wrote to memory of 1812 4928 cmd.exe 105 PID 1116 wrote to memory of 2264 1116 WinToolkit.exe 106 PID 1116 wrote to memory of 2264 1116 WinToolkit.exe 106 PID 2264 wrote to memory of 4164 2264 cmd.exe 108 PID 2264 wrote to memory of 4164 2264 cmd.exe 108 PID 1116 wrote to memory of 3488 1116 WinToolkit.exe 109 PID 1116 wrote to memory of 3488 1116 WinToolkit.exe 109 PID 3488 wrote to memory of 1296 3488 cmd.exe 111 PID 3488 wrote to memory of 1296 3488 cmd.exe 111 PID 1116 wrote to memory of 2468 1116 WinToolkit.exe 112 PID 1116 wrote to memory of 2468 1116 WinToolkit.exe 112 PID 2468 wrote to memory of 692 2468 cmd.exe 114 PID 2468 wrote to memory of 692 2468 cmd.exe 114 PID 1116 wrote to memory of 1092 1116 WinToolkit.exe 115 PID 1116 wrote to memory of 1092 1116 WinToolkit.exe 115 PID 1092 wrote to memory of 1272 1092 cmd.exe 117 PID 1092 wrote to memory of 1272 1092 cmd.exe 117 PID 1116 wrote to memory of 4544 1116 WinToolkit.exe 118 PID 1116 wrote to memory of 4544 1116 WinToolkit.exe 118 PID 4544 wrote to memory of 2168 4544 cmd.exe 120 PID 4544 wrote to memory of 2168 4544 cmd.exe 120 PID 1116 wrote to memory of 3088 1116 WinToolkit.exe 121 PID 1116 wrote to memory of 3088 1116 WinToolkit.exe 121 PID 3088 wrote to memory of 4324 3088 cmd.exe 123 PID 3088 wrote to memory of 4324 3088 cmd.exe 123 PID 1116 wrote to memory of 4328 1116 WinToolkit.exe 124 PID 1116 wrote to memory of 4328 1116 WinToolkit.exe 124 PID 4328 wrote to memory of 4748 4328 cmd.exe 126 PID 4328 wrote to memory of 4748 4328 cmd.exe 126 PID 1116 wrote to memory of 1172 1116 WinToolkit.exe 127 PID 1116 wrote to memory of 1172 1116 WinToolkit.exe 127 PID 1172 wrote to memory of 1260 1172 cmd.exe 129 PID 1172 wrote to memory of 1260 1172 cmd.exe 129 PID 1116 wrote to memory of 4420 1116 WinToolkit.exe 130 PID 1116 wrote to memory of 4420 1116 WinToolkit.exe 130 PID 4420 wrote to memory of 3028 4420 cmd.exe 132 PID 4420 wrote to memory of 3028 4420 cmd.exe 132 PID 1116 wrote to memory of 516 1116 WinToolkit.exe 133 PID 1116 wrote to memory of 516 1116 WinToolkit.exe 133 PID 516 wrote to memory of 4424 516 cmd.exe 135 PID 516 wrote to memory of 4424 516 cmd.exe 135 PID 1116 wrote to memory of 1424 1116 WinToolkit.exe 138 PID 1116 wrote to memory of 1424 1116 WinToolkit.exe 138 PID 1424 wrote to memory of 3092 1424 cmd.exe 140 PID 1424 wrote to memory of 3092 1424 cmd.exe 140 PID 1116 wrote to memory of 4924 1116 WinToolkit.exe 141 PID 1116 wrote to memory of 4924 1116 WinToolkit.exe 141 PID 4924 wrote to memory of 4828 4924 cmd.exe 143 PID 4924 wrote to memory of 4828 4924 cmd.exe 143 PID 1116 wrote to memory of 1540 1116 WinToolkit.exe 144 PID 1116 wrote to memory of 1540 1116 WinToolkit.exe 144 PID 1540 wrote to memory of 4312 1540 cmd.exe 146 PID 1540 wrote to memory of 4312 1540 cmd.exe 146 PID 1116 wrote to memory of 748 1116 WinToolkit.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinToolkit.exe"C:\Users\Admin\AppData\Local\Temp\WinToolkit.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\\cert.reg"2⤵
- Runs .reg file with regedit
PID:1704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.ntlite.com/"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3172 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3652
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\BCD00000000"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:748
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:960
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:532
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵PID:4996
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1120
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:4544
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1704
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1756
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2640
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:4792
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2428
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:3696
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1064
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:3740
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:5080
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:812
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:4512
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:212
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1968
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:3844
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2540
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2224
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:4932
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:1556
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:3812
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SAM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:4488
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2436
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵PID:2440
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758B
MD5f10a581b464275113e8a2fbdecd22432
SHA1ea25fed8bf2d1c69a37f8d1460bf4e5be9665ab8
SHA25636cc04c9df6a9a535bbd8930564146eb5ce3f51a207fe77b2e6d10df875a5212
SHA5124e5e4092b2de2938b215514857e0879c96a3bb1da590630b227ef6692eedb879be1af4d2a655d7ecea547adb1b688b9675f92bae2bd5ccd0d682d586e091c7c1
-
Filesize
832B
MD574acdc20b4af6a000e3a621d1a6bc084
SHA11f5262a49201a447c989db711644e3b1d4b7127e
SHA25606c7743d39374b91cad0e3f281d969d575cfb3b6645b7b3473d9c97434b18342
SHA51234083100974d0f0f48ff26e9759a8e7a48babd5db5a6ce14f43edbc5a7b1c99f28eb8992bb28acb657d7c88b786710e060dcd80be052235bfd5ffaf48920f5c0
-
Filesize
832B
MD5428fe4538571c7735863c1b679c8cf6c
SHA1ad0fdef268f220026166b9b6fb9c3994b1582166
SHA2564eef18c3849474921ed2b2a899bce15340746f43672e31ac66e27c83fd741196
SHA512e3f0115c04dac0ebb8628c200db1720dac60ee552634fe8830296ea91277b3d55a53e15f0f11cd6b75d2d05a1d5fcb1bcf15b13b0a77b6255a6518e2200a4186
-
Filesize
7KB
MD51e841f473f5ae2fd69fe63b97313e546
SHA166a48acec7eae0387f09686c4bdcd6f6dcc447b5
SHA2568bc6102c6eacb53b9e57cb3a73246635fa25b7c6d32dc59439beb2d2240b44f9
SHA51202018267a6289326c4d44a60cc38b66c94fdbdb35142a461810f0f61374947a503d9495cbdfa44af0a20c234bd388f5bca835d3dc2bde6994e83914b28d6484c