Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 19:57
Behavioral task
behavioral1
Sample
devilransom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
devilransom.exe
Resource
win10v2004-20240802-en
General
-
Target
devilransom.exe
-
Size
240KB
-
MD5
b834c44a3e5298a3f23a1355409d2578
-
SHA1
ba9fc22891f7480c49ee9e4d9409f833fc9484d8
-
SHA256
a6ddcbca65d8fdd771f1d9e271a42e601fcebb5e6f6c49ec30113e930b2cd790
-
SHA512
dad2007f6ffdae861cd7eec928a0b1dacf6058595bb9d33e1cd08701c721e347a04921e177e8639fef6e80e3fe29885f7067448f978921075b1e7490b40c0ad3
-
SSDEEP
6144:UeLttJ+VSjv6S0qhH6NAw497/WBzzcT22sW6fvyENEb1HwoS:HLttJ+VSeS0e6N697/+zca2sFf6wtoS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1613.tmp\\installsetupupdate.exe" installsetupupdate.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 installsetupupdate.exe -
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x00000000004FD000-memory.dmp upx behavioral2/memory/1460-19-0x0000000000400000-0x00000000004FD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\userini = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1613.tmp\\installsetupupdate.exe" installsetupupdate.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\Wallpaper = "c:\\bg.bmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language devilransom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installsetupupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3988 reg.exe 4832 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4680 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1472 explorer.exe Token: SeCreatePagefilePrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeCreatePagefilePrivilege 1472 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe 2716 installsetupupdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4724 1460 devilransom.exe 86 PID 1460 wrote to memory of 4724 1460 devilransom.exe 86 PID 1460 wrote to memory of 4724 1460 devilransom.exe 86 PID 4724 wrote to memory of 3988 4724 cmd.exe 87 PID 4724 wrote to memory of 3988 4724 cmd.exe 87 PID 4724 wrote to memory of 3988 4724 cmd.exe 87 PID 4724 wrote to memory of 4832 4724 cmd.exe 88 PID 4724 wrote to memory of 4832 4724 cmd.exe 88 PID 4724 wrote to memory of 4832 4724 cmd.exe 88 PID 4724 wrote to memory of 464 4724 cmd.exe 89 PID 4724 wrote to memory of 464 4724 cmd.exe 89 PID 4724 wrote to memory of 464 4724 cmd.exe 89 PID 4724 wrote to memory of 4084 4724 cmd.exe 90 PID 4724 wrote to memory of 4084 4724 cmd.exe 90 PID 4724 wrote to memory of 4084 4724 cmd.exe 90 PID 4724 wrote to memory of 1504 4724 cmd.exe 92 PID 4724 wrote to memory of 1504 4724 cmd.exe 92 PID 4724 wrote to memory of 1504 4724 cmd.exe 92 PID 4724 wrote to memory of 2008 4724 cmd.exe 93 PID 4724 wrote to memory of 2008 4724 cmd.exe 93 PID 4724 wrote to memory of 2008 4724 cmd.exe 93 PID 4724 wrote to memory of 1600 4724 cmd.exe 94 PID 4724 wrote to memory of 1600 4724 cmd.exe 94 PID 4724 wrote to memory of 1600 4724 cmd.exe 94 PID 4724 wrote to memory of 2536 4724 cmd.exe 96 PID 4724 wrote to memory of 2536 4724 cmd.exe 96 PID 4724 wrote to memory of 2536 4724 cmd.exe 96 PID 4724 wrote to memory of 4500 4724 cmd.exe 97 PID 4724 wrote to memory of 4500 4724 cmd.exe 97 PID 4724 wrote to memory of 4500 4724 cmd.exe 97 PID 4724 wrote to memory of 4680 4724 cmd.exe 99 PID 4724 wrote to memory of 4680 4724 cmd.exe 99 PID 4724 wrote to memory of 4680 4724 cmd.exe 99 PID 4724 wrote to memory of 2716 4724 cmd.exe 100 PID 4724 wrote to memory of 2716 4724 cmd.exe 100 PID 4724 wrote to memory of 2716 4724 cmd.exe 100 PID 4724 wrote to memory of 4784 4724 cmd.exe 101 PID 4724 wrote to memory of 4784 4724 cmd.exe 101 PID 4724 wrote to memory of 4784 4724 cmd.exe 101 PID 4724 wrote to memory of 2956 4724 cmd.exe 102 PID 4724 wrote to memory of 2956 4724 cmd.exe 102 PID 4724 wrote to memory of 2956 4724 cmd.exe 102 PID 4724 wrote to memory of 3252 4724 cmd.exe 103 PID 4724 wrote to memory of 3252 4724 cmd.exe 103 PID 4724 wrote to memory of 3252 4724 cmd.exe 103 PID 4724 wrote to memory of 4288 4724 cmd.exe 104 PID 4724 wrote to memory of 4288 4724 cmd.exe 104 PID 4724 wrote to memory of 4288 4724 cmd.exe 104 PID 4724 wrote to memory of 4040 4724 cmd.exe 106 PID 4724 wrote to memory of 4040 4724 cmd.exe 106 PID 4724 wrote to memory of 4040 4724 cmd.exe 106 PID 4724 wrote to memory of 1120 4724 cmd.exe 107 PID 4724 wrote to memory of 1120 4724 cmd.exe 107 PID 4724 wrote to memory of 1120 4724 cmd.exe 107 PID 4724 wrote to memory of 2464 4724 cmd.exe 108 PID 4724 wrote to memory of 2464 4724 cmd.exe 108 PID 4724 wrote to memory of 2464 4724 cmd.exe 108 PID 4724 wrote to memory of 4708 4724 cmd.exe 109 PID 4724 wrote to memory of 4708 4724 cmd.exe 109 PID 4724 wrote to memory of 4708 4724 cmd.exe 109 PID 4724 wrote to memory of 4472 4724 cmd.exe 110 PID 4724 wrote to memory of 4472 4724 cmd.exe 110 PID 4724 wrote to memory of 4472 4724 cmd.exe 110 PID 4724 wrote to memory of 2312 4724 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\devilransom.exe"C:\Users\Admin\AppData\Local\Temp\devilransom.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1613.tmp\devilransom.bat""2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3988
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4832
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f3⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\devilransom.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\1613.tmp\installsetupupdate.exeinstallsetupupdate.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2716
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5ee1b910539fb2e71ed52d051c6a5c9b5
SHA1ffee3fdfaf7e62ea14fd52f6a9d5b774d58ab720
SHA2564b23052d3e199074c625ba9c5ed3969e8122190ce602917105a4c34efdfe826a
SHA512097ab1ee2a2207264f789defb6b78d8bb1b4538461eb3af0ce7a6163f1007ecdab678eeeaebcd65853fa2430a9890f8e0ecac5b89908e045cf9493fc4017e23d
-
Filesize
2KB
MD5accb994f867d9220d44459a0c8c04de7
SHA1411d8675cab78d319a38dbc9b056c45cc19eba63
SHA25636329399497e0e53e89d66a7ad23ce8094cd08601aac65173a4d73135f1d77ff
SHA51293558ca1e9e941dde6e77337a53f6929d9ef62d4b676490be78550ec0ae93b24545100cf15f8b8ed1138cd8fbe25a1399d862e1e40a2f6a826eca0619dad0f6e
-
Filesize
436KB
MD56c5a3a112b3940c55f8653597b1b7152
SHA13578eb4cf6c30d3bd779c5e3b1ddbf6a8a2ab3b5
SHA256471a338122025eb481779092de78653df6434715590d741c95e5138c87147488
SHA51212edede68b9b473cbe0f0a650643912f394d3ad60b2687e465f7a27d15ac5fd94568c29692140b84c5a194b65a450a65358f6278a6f1025bfd44071d357c716b
-
Filesize
106B
MD5f9cfc983bdfc1fb2f265918fbe0d9c65
SHA1ee5d34343e484e8133c3423db32bd458779896b9
SHA256eb2521cac865e84299e54641b5036ec4c789b012850c859fb38de0599e408312
SHA512a97fb3e00139a1ab40648ff645700cebdfabacf2ac117c10f6e24efd8bf05fc2218fa866c8189e67ea99295f0966eafaea2f3e5dd19eb3bb46d78a89ba25f5d6