Analysis
-
max time kernel
109s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
Resource
win10v2004-20240802-en
General
-
Target
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
-
Size
293KB
-
MD5
8c3b257c8eeb716f031d139d0cb7e0f0
-
SHA1
c7830338effc41014091fabf61cf31e43833eee4
-
SHA256
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98d
-
SHA512
f1680c394e87ad690528cca691dc3522762353bc3958938828764aae65ae1d206b14bb858323740f70acca94ebd3aa46950412a32c90a5e45c263f839ec6a58d
-
SSDEEP
3072:ut9VrYlEYNE+pYO/PZXgNtwVJiyQ2/YO/PZXgNtwVJiyQ2Prlsodwpx:ut9V82Y2yP9UOVJiyv1P9UOVJiyvLm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ microsoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ misrosoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defender.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4180 powershell.exe 1624 powershell.exe 1780 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation misrosoft.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation defender.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe -
Executes dropped EXE 4 IoCs
pid Process 1692 misrosoft.exe 1072 defender (2).exe 4408 defender.exe 2276 microsoft.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\defender (2) = "C:\\Users\\Admin\\AppData\\Local\\Temp\\defender (2).exe" d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ misrosoft.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ defender.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misrosoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4716 PING.EXE 452 PING.EXE -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4568 reg.exe 3600 reg.exe 468 reg.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 452 PING.EXE 4716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4180 powershell.exe 4180 powershell.exe 1624 powershell.exe 1624 powershell.exe 1780 powershell.exe 1780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4180 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 microsoft.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4180 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 82 PID 2956 wrote to memory of 4180 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 82 PID 2956 wrote to memory of 1692 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 84 PID 2956 wrote to memory of 1692 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 84 PID 2956 wrote to memory of 1692 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 84 PID 2956 wrote to memory of 1624 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 85 PID 2956 wrote to memory of 1624 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 85 PID 1692 wrote to memory of 776 1692 misrosoft.exe 87 PID 1692 wrote to memory of 776 1692 misrosoft.exe 87 PID 1692 wrote to memory of 776 1692 misrosoft.exe 87 PID 776 wrote to memory of 4568 776 cmd.exe 89 PID 776 wrote to memory of 4568 776 cmd.exe 89 PID 776 wrote to memory of 4568 776 cmd.exe 89 PID 2956 wrote to memory of 1072 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 90 PID 2956 wrote to memory of 1072 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 90 PID 2956 wrote to memory of 1072 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 90 PID 2956 wrote to memory of 1780 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 91 PID 2956 wrote to memory of 1780 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 91 PID 1692 wrote to memory of 4348 1692 misrosoft.exe 93 PID 1692 wrote to memory of 4348 1692 misrosoft.exe 93 PID 1692 wrote to memory of 4348 1692 misrosoft.exe 93 PID 4348 wrote to memory of 452 4348 cmd.exe 95 PID 4348 wrote to memory of 452 4348 cmd.exe 95 PID 4348 wrote to memory of 452 4348 cmd.exe 95 PID 2956 wrote to memory of 4408 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 96 PID 2956 wrote to memory of 4408 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 96 PID 2956 wrote to memory of 4408 2956 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 96 PID 4408 wrote to memory of 2268 4408 defender.exe 97 PID 4408 wrote to memory of 2268 4408 defender.exe 97 PID 4408 wrote to memory of 2268 4408 defender.exe 97 PID 2268 wrote to memory of 3600 2268 cmd.exe 99 PID 2268 wrote to memory of 3600 2268 cmd.exe 99 PID 2268 wrote to memory of 3600 2268 cmd.exe 99 PID 4408 wrote to memory of 2696 4408 defender.exe 100 PID 4408 wrote to memory of 2696 4408 defender.exe 100 PID 4408 wrote to memory of 2696 4408 defender.exe 100 PID 2696 wrote to memory of 4716 2696 cmd.exe 102 PID 2696 wrote to memory of 4716 2696 cmd.exe 102 PID 2696 wrote to memory of 4716 2696 cmd.exe 102 PID 4348 wrote to memory of 2276 4348 cmd.exe 105 PID 4348 wrote to memory of 2276 4348 cmd.exe 105 PID 4348 wrote to memory of 2276 4348 cmd.exe 105 PID 2276 wrote to memory of 2260 2276 microsoft.exe 106 PID 2276 wrote to memory of 2260 2276 microsoft.exe 106 PID 2276 wrote to memory of 2260 2276 microsoft.exe 106 PID 2260 wrote to memory of 468 2260 cmd.exe 108 PID 2260 wrote to memory of 468 2260 cmd.exe 108 PID 2260 wrote to memory of 468 2260 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe"C:\Users\Admin\AppData\Local\Temp\d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\misrosoft.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\misrosoft.exe"C:\Users\Admin\AppData\Local\Temp\misrosoft.exe"2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:452
-
-
C:\Users\Admin\AppData\Roaming\defender\microsoft.exe"C:\Users\Admin\AppData\Roaming\defender\microsoft.exe"4⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:468
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\defender (2).exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\defender (2).exe"C:\Users\Admin\AppData\Local\Temp\defender (2).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe"2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
92KB
MD5018087124a68d932b08441955984e5a4
SHA14ce20358d6c440c9814ca7b892930f499913401c
SHA256df3917c693593e978512e4fdb0c3f0dc892393c88c1a1b09a2d6afa75e3240ec
SHA51266506ecb809019be202401021d8aae3bd3429b858832d9fc8ae9a90d3d293eeacc802d540c064d6b4a590a5c280317f66214be07a1b965ccf77eaa8d52efcd57
-
Filesize
159B
MD591a2507abed09c48bac27a9204b9f7e2
SHA1d34be7add1f08c7a3c0e6dc4a6251fcbb3620176
SHA25665cdf9c336984b99b79f4d22001adce5527c2bf96d5145f2b30389d07bed18f4
SHA5125f8e0420fa9edb57c980fcd94f350c3d68cf0e92eb00423b33e21f5023cc39f1229d8e7ffcd2ef098bc187fa3eda4652f88aa8871c8695783d360559470dc47a
-
Filesize
201B
MD5fe1703cfb0217733080dace7a21c86e3
SHA1afd0b0c55a06ab80f01ff49b890faf9da676c15b
SHA2565e923f2f31cfb11dc2a824a10b0d7e9972e52f54f9e4eec5fe10fa509f1bd233
SHA512a30282dbebd07d986c3d501dfe8ade4e25f5ed8b6a1148356836db38deb12cee3c9679797c7a43e20f1616ba1d41b8b45e168dd2017a17d181636e83f6865488
-
Filesize
92KB
MD5cb70f204cff86929460417f9f9d2006a
SHA10f961fa8ea5c3732fddd7a920840940c5d9ebf36
SHA256199babe8f13c8a6a08754c697bf04df6b6f06c45de3c7ba7b55666f406baf912
SHA51203c2e62316ce6acd3e8c85cba20cb63bbb39a2ef7947a669e0feb45e911d5fe9a6fa87003eb00a9235749a74ed1f8d5e530ae1ed183f0d2f72d038882681d5c8